GNU Tar and GNU Cpio heap-based buffer overflow vulnerability

2010.03.11
Credit: Jakob Lell
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-119

I. BACKGROUND GNU Tar and GNU Cpio are popular programs for managing archive files. Both programs are included in many linux distributions. GNU Tar is commonly used for exchanging source code archives. Both programs include a client implementation for the remote mag tape protocol (rmt). This protocol allows accessing a tape device attached to a remote system via a rsh/ssh. It can also be used to extract/create archive files on another system directly using Tar/Cpio (although using rmt for accessing remote files is deprecated). II. DESCRIPTION The rmt client implementation of GNU Tar/Cpio contains a heap-based buffer overflow which possibly allows arbitrary code execution. The vulnerability is in the function rmt_read__ in lib/rtapelib.c: /* Read up to LENGTH bytes into BUFFER from remote tape connection HANDLE. Return the number of bytes read on success, SAFE_READ_ERROR on error. */ size_t rmt_read__ (int handle, char *buffer, size_t length) { char command_buffer[COMMAND_BUFFER_SIZE]; size_t status; size_t rlen; size_t counter; sprintf (command_buffer, "R%lu\n", (unsigned long) length); if (do_command (handle, command_buffer) == -1 || (status = get_status (handle)) == SAFE_READ_ERROR) return SAFE_READ_ERROR; for (counter = 0; counter < status; counter += rlen, buffer += rlen) { rlen = safe_read (READ_SIDE (handle), buffer, status - counter); if (rlen == SAFE_READ_ERROR || rlen == 0) { _rmt_shutdown (handle, EIO); return SAFE_READ_ERROR; } } return status; } The function first writes to the server how many bytes it wants to read using sprintf() and do_command(). Then it reads the number of bytes available into the variable status using get_status(). In the for loop, the function reads status bytes from the server into the buffer. However, it doesn't check whether status is actually less than or equal the length of the buffer given by the parameter length. So a malicious rmt server can overwrite data on the heap following the buffer. Successful exploitation of this bug could possibly lead to arbitrary code execution. III. EXPLOIT VECTORS The problem can be exploited when using an untrusted/compromised rmt server. The impact is fairly low since rmt is rarely used today and the rmt server is in most cases considered trustworthy. However, this vulnerability can also be triggered when trying to extract a tar file with a colon in the filename. In this case, tar interprets the part before the colon as a hostname (or user@hostname) and opens a rsh connection to this host. This may also be exploited if the user uses the aunpack script from atool [1] to extract a tar file. Many users of GNU Tar or atool don't know that rmt exists and that tar treats filenames containing a colon differently. So a user might run tar or aunpack on a file which he has received via email or downloaded from a web page. Many users enter filenames using bash auto-completion and thus might not even notice that there is anything wrong with the filename. For Cpio, this attack vector does not work since Cpio requires the option --rsh-command to use rmt. Tar has compiled in the default value "/usr/bin/rsh". It is also possible that there are scripts out there which automatically call Tar to extract a file with a name provided by an untrusted source. If the script passes the filename with an (absolute or relative) path or uses the --force-local option, this problem can be avoided Notes on rsh/ssh: GNU Tar uses /usr/bin/rsh to execute the rmt server implementation (/usr/bin/rmt) on the server. On most modern linux systems /usr/bin/rsh is just a symlink to ssh. So an attempt to exploit this vulnerability might make ssh ask the user whether to add a new key to the known_hosts file. This gives users the possibility to cancel the program and thus prevent successful exploitation. However, the problem can still be exploited if the attacker has compromised a machine which is already in the users known_hosts file or if the user has set StrictHostKeyChecking to "no" in his ssh configuration. IV. WORKAROUND Do not use the integrated rmt client of GNU Tar/Cpio if the rmt server is untrusted or potentially compromised. Always check that the filename doesn't contain a colon when extracting tar files or use the --force-local option. V. SOLUTION: Upgrade GNU Tar to version 1.23 and GNU Cpio to version 2.11. Some Linux Distributions are going to release upgrades packages today or in the next few days. VI. DISCLOSURE TIMELINE 2010/02/12: Vendor and major Linux Distributions notified 2010/03/10: Public disclosure VI. Credit This vulnerability has been discovered by Jakob Lell from the TU Berlin computer security working group (AGRS). http://www.agrs.tu-berlin.de/parameter/en/ A copy of this advisory is also available on the following page: http://www.agrs.tu-berlin.de/index.php?id=78327 [1] http://www.nongnu.org/atool/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top