exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

jpegtoavi.txt

jpegtoavi.txt
Posted Dec 30, 2004
Authored by James Longstreet

jpegtoavi version 1.5 is susceptible to a buffer overflow in the get_file_list_stdin() function.

tags | advisory, overflow
SHA-256 | 6aa04b2b8cb6f9f6ed955f347b513ea25c78b28773707235e13381e33f38860c

jpegtoavi.txt

Change Mirror Download
From djb@cr.yp.to Wed Dec 15 14:20:49 2004
Date: 15 Dec 2004 08:16:04 -0000
From: D. J. Bernstein <djb@cr.yp.to>
To: securesoftware@list.cr.yp.to, di77ihd@users.sourceforge.net
Subject: [remote] [control] jpegtoavi 1.5 get_file_list_stdin overflows fn
buffer

James Longstreet, a student in my Fall 2004 UNIX Security Holes course,
has discovered a remotely exploitable security hole in jpegtoavi. I'm
publishing this notice, but all the discovery credits should be assigned
to Longstreet.

You are at risk if you take jpegtoavi input---a set of JPEG files and a
file listing the names of the JPEG files---from an email message (or a
web page or any other source that could be controlled by an attacker).
Whoever provides that input then has complete control over your account:
he can read and modify your files, watch the programs you're running,
etc.

Of course, when you accept a list of input filenames from someone else,
you are running the risk that those filenames include some of your
files, so that the jpegtoavi output will include some of your files
(maybe secret pictures). But the jpegtoavi documentation does not
suggest that there is any larger risk.

Proof of concept: On an x86 computer running Linux with gcc 2.95.4, type

wget http://umn.dl.sourceforge.net/sourceforge/jpegtoavi/jpegtoavi-1.5.tar.gz
gunzip < jpegtoavi-1.5.tar.gz | tar -xf -
cd jpegtoavi-1.5
make

to download and compile the jpegtoavi program. Then save the file
10.list attached to this message, and type

./jpegtoavi -f 1 640 480 < 10.list

with the unauthorized result that a directory named ``hacked'' is
created inside the current directory.

Here's the bug: In jpegtoavi.c, get_file_list_stdin() uses an
unprotected %s scanf to read any number of bytes into an fn[] array.

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago

[ Part 2, Text/PLAIN (charset: unknown-8bit) 95 lines. ]
[ Unable to print this part. ]

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close