[Konversation-devel] Re: konversation security bugs
Ismail Donmez
ismail at kde.org.tr
Thu Jan 20 12:31:23 CET 2005
On Thursday 20 January 2005 12:46, Waldo Bastian wrote:
> * Evaluate the actual impact of the listed problems, can they be used by a
> bad guy to do harm? How?
Using a special crafted channel name and making user join it one can do two
things :
- Execute one word commands like can run "kwrite","ls" etc but can't run "ls
-al","rm -rf" etc due to the fact that channel names can't contain spaces
> * Get a CVE number (I can do that)
Ok, cool
> * Prepare a patch that fixes the problems.
http://janeway.no-ip.org/~cartman/kubuntu/security.diff
> * Review the patch to make sure it fixes all problems.
Yes its tested.
> * Decide whether you want to release a new version, the webpage above
> > mentions konversation 0.15.1 but I don't see it mentioned on the
> konversation download page. (Who makes the release for konversation?)
I did the release its on http://developer.berlios.de/projects/konversation
> * Prepare the advisory (anyone can do that, just take an entry from
> http://www.kde.org/info/security and use that as template)
Attached for review.
Regards,
ismail
-------------- next part --------------
KDE Security Advisory: Multiple vulnerabilities in Konversation
Original Release Date: 20050120
URL: http://www.kde.org/info/security/advisory-YYYYMMDD-X.txt
0. References
http://lists.netsys.com/pipermail/full-disclosure/2005-January/031033.html
1. Systems affected:
All Konversation versions up to and including 0.15
2. Overview:
The Server::parseWildcards function is buggy: to expand % variables,
it does a series of QString.replace's, so the value for one variable can contain another variable,
which will then be expanded too.
Perl scripts included with Konversation execute a command line
similar to: exec ("dcop $PORT Konversation say $SERVER \"$TARGET\" output");
shell characters in $SERVER or $TARGET aren't escaped.
Nick and password are confused in the quick connection dialog,
so connecting with that dialog and filling in a password, would use that password as nick
3. Impact:
User might be tricked to join a channel which contains shell character in its name. If user runs
a script in that channel it will result in an arbitrary command execution.
If quick connect used with a password user nick contains the password and the password
used is nickname resulting in password exposure.
4. Solution:
Upgrade to Konversation 0.15.1 (http://download.berlios.de/konversation/konversation-0.15.1.tar.bz2)
5. Patch:
A patch for Konversation 0.15 is available from http://janeway.no-ip.org/~cartman/kubuntu/security.diff
36f8b6beac18a9d173339388d13e2335 security.diff
More information about the Konversation-devel
mailing list