Subject: Re: Fwd: CERT Advisory CA-2002-12 Format String Vulnerability in ISC DHCPD
To: Jeremy C. Reed <reed@reedmedia.net>
From: Steven M. Bellovin <smb@research.att.com>
List: tech-security
Date: 05/09/2002 07:40:52
In message <Pine.LNX.4.43.0205082132230.702-100000@pilchuck.reedmedia.net>, "Je
remy C. Reed" writes:
>
>
>It probably was not "suspicious". And anyways I don't know if the
>patches were sent to ISC.
>
It was suspicious -- it was a classic case of a format string vulnerability.
Someone dropped the ball, though I don't know if it was a NetBSD
developer or an ISC developer.
Very briefly, if you have
printf(str);
instead of
printf("%s", str);
and str is supplied by the enemy, you are in danger. (For the gory
details, see http://online.securityfocus.com/archive/1/81565)
From the CERT advisory, this was an indirect call, but the problem is
the same.
--Steve Bellovin, http://www.research.att.com/~smb
Full text of "Firewalls" book now at http://www.wilyhacker.com