The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
VMPS Syslog Format String Vulnerability
------------------------------------------------------------------------
SUMMARY
<http://sourceforge.net/projects/vmps> VMPS (VLAN Management Policy
Server) is "a way of assigning switch ports to specific VLANs based on MAC
address of connecting device. OpenVMPS is a GPL implementation of VMPS".
A format string vulnerability in VMPS allows remote attackers to cause the
program to execute arbitrary.
DETAILS
Vulnerable Systems:
* VMPS version 1.3
The format string vulnerability can be found in /vmpsd-1.3/log.c file:
void vmps_log(const int level, const char *fmt, ...)
{
char str[256];
va_list ap;
if ( ((log_level & 0xFF00) >= (level & 0xFF00)) &&
((level & log_level & 0x00FF) > 0) ) {
va_start(ap, fmt);
if ( !log_opened ) {
openlog("vmpsd", LOG_CONS, LOG_LOCAL6);
log_opened = 1;
}
vsnprintf(str, 256, fmt, ap);
syslog(LOG_INFO, str); // here is the bug
ADDITIONAL INFORMATION
The information has been provided by <mailto:mazahaquer@ok.kz>
mazahaquer.
========================================
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com
====================
====================
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
No comments:
Post a Comment