[PATCH:xsm] Add size limit to scanf string specifier

Alan Coopersmith alan.coopersmith at oracle.com
Wed Nov 30 13:50:15 PST 2011


On 11/29/11 23:27, Jeremy Huddleston wrote:
> Reviewed-by: Jeremy Huddleston<jeremyhu at apple.com>
>
> <lazy>Can this be exploited?</lazy>

I assumed not, which is why I sent it to xorg-devel and not xorg-security.

xsm should not be installed with any form of setuid/setgid privileges, and
this is reading from a lock file in the directory in which your session
configuration is saved (read from $SM_SAVE_DIR environment variable if set,
$HOME if not) - if the files in that directory are writable by anyone else,
then the attacker could just insert commands to be run in your session instead
of trying to overflow a buffer and then run an exploit.

This may stop crashes if a lock file gets corrupted, but should not have
any security effect.

-- 
	-Alan Coopersmith-        alan.coopersmith at oracle.com
	 Oracle Solaris Platform Engineering: X Window System



More information about the xorg-devel mailing list