[Fwd: Re: [Advisories] Libpurple security vulnerability CORE-2009-0727]
Luke Schierer
lschiere at pidgin.im
Fri Jul 31 15:22:23 EDT 2009
---------------------------- Original Message ----------------------------
Subject: Re: [Advisories] Libpurple security vulnerability CORE-2009-0727
From: "Core Security Advisories Team (jo)"
<advisories-publication at coresecurity.com>
Date: Fri, July 31, 2009 14:39
To: "Luke Schierer" <lschiere at pidgin.im>
Cc: "Federico Muttis" <acid at corest.com>
"CORE Security Technologies Advisories-publication"
<advisories-publication at coresecurity.com>
--------------------------------------------------------------------------
Luke,
Here is the PoC that triggers the bug. To run exploit.py you must first
edit msnclient.py:
# Setup some MSN accounts
self.account = "Attacker MSN account"
self.password = "Attacker password"
self.victim = "Victim MSN Account"
self.display_name = "My Display Name"
# Set your proxy if you need it, with this format:
#self.proxy = "192.168.254.254:80"
# Else, leave it blank.
self.proxy = ""
Don't hesitate to write if you have any doubt or comment.
Regards,
Jose.
Luke Schierer escribió:
> We have looked into the code and we're not sure how this can be triggered.
> You have outlined a two-step process. For the second step, you say
> buffer is NULL, thus allowing a memcpy to an arbitrary location.
> However, we don't see how this could happen. The buffer should either
> have been allocated in the first step, or if that fails, the original
> message would be destroyed. And without that, the second part could
> not occur. So, how are you getting buffer to be NULL?
>
> Thanks!
>
> Luke
>
> On Jul 30, 2009, at 13:17 EDT, Core Security Advisories Team (jo) wrote:
>
>
> > Hi,
>
> > I am attaching a preliminary version of the advisory, written by
> > Federico Muttis, encrypted with Luke's key. Don't hesitate to write back
> > if you have any doubts or comments. We are planning to release the
> > advisory on August 18th, 2009.
>
> > Regards,
> > Jose.
>
> > --José I. Orlicki
> > Advisories Team
> > Core Security Technologies
> >
> http://corelabs.coresecurity.com/index.php?module=FrontEndMod&action=list&type=advisory
>
> > <pidgin-1.txt.pgp>
>
--
José I. Orlicki
Advisories Team
Core Security Technologies
http://corelabs.coresecurity.com/index.php?module=FrontEndMod&action=list&type=advisory
-------------- next part --------------
A non-text attachment was scrubbed...
Name: Libpurple-2.5.8_PoC.pgp
Type: application/octet-stream
Size: 12704 bytes
Desc: not available
URL: <http://pidgin.im/cgi-bin/mailman/private/packagers/attachments/20090731/2796b3dc/attachment.obj>
More information about the Packagers
mailing list