- djm@cvs.openbsd.org 2006/01/31 10:19:02

[misc.c misc.h scp.c sftp.c]
     fix local arbitrary command execution vulnerability on local/local and
     remote/remote copies (CVE-2006-0225, bz #1094), patch by
     t8m AT centrum.cz, polished by dtucker@ and myself; ok markus@
This commit is contained in:
Damien Miller 2006-01-31 21:49:27 +11:00
parent b5dd55cccc
commit 3eec6b73a2
5 changed files with 145 additions and 55 deletions

View File

@ -28,6 +28,11 @@
remove an incorrect sentence; remove an incorrect sentence;
reported by roumen petrov; reported by roumen petrov;
ok djm markus ok djm markus
- djm@cvs.openbsd.org 2006/01/31 10:19:02
[misc.c misc.h scp.c sftp.c]
fix local arbitrary command execution vulnerability on local/local and
remote/remote copies (CVE-2006-0225, bz #1094), patch by
t8m AT centrum.cz, polished by dtucker@ and myself; ok markus@
20060129 20060129
- (dtucker) [configure.ac opensshd.init.in] Bug #1144: Use /bin/sh for the - (dtucker) [configure.ac opensshd.init.in] Bug #1144: Use /bin/sh for the
@ -3753,4 +3758,4 @@
- (djm) Trim deprecated options from INSTALL. Mention UsePAM - (djm) Trim deprecated options from INSTALL. Mention UsePAM
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
$Id: ChangeLog,v 1.4100 2006/01/31 10:47:58 djm Exp $ $Id: ChangeLog,v 1.4101 2006/01/31 10:49:27 djm Exp $

45
misc.c
View File

@ -24,7 +24,7 @@
*/ */
#include "includes.h" #include "includes.h"
RCSID("$OpenBSD: misc.c,v 1.41 2006/01/05 23:43:53 djm Exp $"); RCSID("$OpenBSD: misc.c,v 1.42 2006/01/31 10:19:02 djm Exp $");
#ifdef SSH_TUN_OPENBSD #ifdef SSH_TUN_OPENBSD
#include <net/if.h> #include <net/if.h>
@ -391,12 +391,15 @@ void
addargs(arglist *args, char *fmt, ...) addargs(arglist *args, char *fmt, ...)
{ {
va_list ap; va_list ap;
char buf[1024]; char *cp;
u_int nalloc; u_int nalloc;
int r;
va_start(ap, fmt); va_start(ap, fmt);
vsnprintf(buf, sizeof(buf), fmt, ap); r = vasprintf(&cp, fmt, ap);
va_end(ap); va_end(ap);
if (r == -1)
fatal("addargs: argument too long");
nalloc = args->nalloc; nalloc = args->nalloc;
if (args->list == NULL) { if (args->list == NULL) {
@ -407,10 +410,44 @@ addargs(arglist *args, char *fmt, ...)
args->list = xrealloc(args->list, nalloc * sizeof(char *)); args->list = xrealloc(args->list, nalloc * sizeof(char *));
args->nalloc = nalloc; args->nalloc = nalloc;
args->list[args->num++] = xstrdup(buf); args->list[args->num++] = cp;
args->list[args->num] = NULL; args->list[args->num] = NULL;
} }
void
replacearg(arglist *args, u_int which, char *fmt, ...)
{
va_list ap;
char *cp;
int r;
va_start(ap, fmt);
r = vasprintf(&cp, fmt, ap);
va_end(ap);
if (r == -1)
fatal("replacearg: argument too long");
if (which >= args->num)
fatal("replacearg: tried to replace invalid arg %d >= %d",
which, args->num);
xfree(args->list[which]);
args->list[which] = cp;
}
void
freeargs(arglist *args)
{
u_int i;
if (args->list != NULL) {
for (i = 0; i < args->num; i++)
xfree(args->list[i]);
xfree(args->list);
args->nalloc = args->num = 0;
args->list = NULL;
}
}
/* /*
* Expands tildes in the file name. Returns data allocated by xmalloc. * Expands tildes in the file name. Returns data allocated by xmalloc.
* Warning: this calls getpw*. * Warning: this calls getpw*.

8
misc.h
View File

@ -1,4 +1,4 @@
/* $OpenBSD: misc.h,v 1.28 2005/12/08 18:34:11 reyk Exp $ */ /* $OpenBSD: misc.h,v 1.29 2006/01/31 10:19:02 djm Exp $ */
/* /*
* Author: Tatu Ylonen <ylo@cs.hut.fi> * Author: Tatu Ylonen <ylo@cs.hut.fi>
@ -38,7 +38,11 @@ struct arglist {
u_int num; u_int num;
u_int nalloc; u_int nalloc;
}; };
void addargs(arglist *, char *, ...) __attribute__((format(printf, 2, 3))); void addargs(arglist *, char *, ...)
__attribute__((format(printf, 2, 3)));
void replacearg(arglist *, u_int, char *, ...)
__attribute__((format(printf, 3, 4)));
void freeargs(arglist *);
/* readpass.c */ /* readpass.c */

132
scp.c
View File

@ -71,7 +71,7 @@
*/ */
#include "includes.h" #include "includes.h"
RCSID("$OpenBSD: scp.c,v 1.128 2005/12/06 22:38:27 reyk Exp $"); RCSID("$OpenBSD: scp.c,v 1.129 2006/01/31 10:19:02 djm Exp $");
#include "xmalloc.h" #include "xmalloc.h"
#include "atomicio.h" #include "atomicio.h"
@ -118,6 +118,48 @@ killchild(int signo)
exit(1); exit(1);
} }
static int
do_local_cmd(arglist *a)
{
u_int i;
int status;
pid_t pid;
if (a->num == 0)
fatal("do_local_cmd: no arguments");
if (verbose_mode) {
fprintf(stderr, "Executing:");
for (i = 0; i < a->num; i++)
fprintf(stderr, " %s", a->list[i]);
fprintf(stderr, "\n");
}
if ((pid = fork()) == -1)
fatal("do_local_cmd: fork: %s", strerror(errno));
if (pid == 0) {
execvp(a->list[0], a->list);
perror(a->list[0]);
exit(1);
}
do_cmd_pid = pid;
signal(SIGTERM, killchild);
signal(SIGINT, killchild);
signal(SIGHUP, killchild);
while (waitpid(pid, &status, 0) == -1)
if (errno != EINTR)
fatal("do_local_cmd: waitpid: %s", strerror(errno));
do_cmd_pid = -1;
if (!WIFEXITED(status) || WEXITSTATUS(status) != 0)
return (-1);
return (0);
}
/* /*
* This function executes the given command as the specified user on the * This function executes the given command as the specified user on the
* given host. This returns < 0 if execution fails, and >= 0 otherwise. This * given host. This returns < 0 if execution fails, and >= 0 otherwise. This
@ -162,7 +204,7 @@ do_cmd(char *host, char *remuser, char *cmd, int *fdin, int *fdout, int argc)
close(pin[0]); close(pin[0]);
close(pout[1]); close(pout[1]);
args.list[0] = ssh_program; replacearg(&args, 0, "%s", ssh_program);
if (remuser != NULL) if (remuser != NULL)
addargs(&args, "-l%s", remuser); addargs(&args, "-l%s", remuser);
addargs(&args, "%s", host); addargs(&args, "%s", host);
@ -227,8 +269,9 @@ main(int argc, char **argv)
__progname = ssh_get_progname(argv[0]); __progname = ssh_get_progname(argv[0]);
memset(&args, '\0', sizeof(args));
args.list = NULL; args.list = NULL;
addargs(&args, "ssh"); /* overwritten with ssh_program */ addargs(&args, "%s", ssh_program);
addargs(&args, "-x"); addargs(&args, "-x");
addargs(&args, "-oForwardAgent no"); addargs(&args, "-oForwardAgent no");
addargs(&args, "-oPermitLocalCommand no"); addargs(&args, "-oPermitLocalCommand no");
@ -368,6 +411,10 @@ toremote(char *targ, int argc, char **argv)
{ {
int i, len; int i, len;
char *bp, *host, *src, *suser, *thost, *tuser, *arg; char *bp, *host, *src, *suser, *thost, *tuser, *arg;
arglist alist;
memset(&alist, '\0', sizeof(alist));
alist.list = NULL;
*targ++ = 0; *targ++ = 0;
if (*targ == 0) if (*targ == 0)
@ -385,56 +432,48 @@ toremote(char *targ, int argc, char **argv)
tuser = NULL; tuser = NULL;
} }
if (tuser != NULL && !okname(tuser)) {
xfree(arg);
return;
}
for (i = 0; i < argc - 1; i++) { for (i = 0; i < argc - 1; i++) {
src = colon(argv[i]); src = colon(argv[i]);
if (src) { /* remote to remote */ if (src) { /* remote to remote */
static char *ssh_options = freeargs(&alist);
"-x -o'ClearAllForwardings yes'"; addargs(&alist, "%s", ssh_program);
if (verbose_mode)
addargs(&alist, "-v");
addargs(&alist, "-x");
addargs(&alist, "-oClearAllForwardings yes");
addargs(&alist, "-n");
*src++ = 0; *src++ = 0;
if (*src == 0) if (*src == 0)
src = "."; src = ".";
host = strrchr(argv[i], '@'); host = strrchr(argv[i], '@');
len = strlen(ssh_program) + strlen(argv[i]) +
strlen(src) + (tuser ? strlen(tuser) : 0) +
strlen(thost) + strlen(targ) +
strlen(ssh_options) + CMDNEEDS + 20;
bp = xmalloc(len);
if (host) { if (host) {
*host++ = 0; *host++ = 0;
host = cleanhostname(host); host = cleanhostname(host);
suser = argv[i]; suser = argv[i];
if (*suser == '\0') if (*suser == '\0')
suser = pwd->pw_name; suser = pwd->pw_name;
else if (!okname(suser)) { else if (!okname(suser))
xfree(bp);
continue; continue;
} addargs(&alist, "-l");
if (tuser && !okname(tuser)) { addargs(&alist, "%s", suser);
xfree(bp);
continue;
}
snprintf(bp, len,
"%s%s %s -n "
"-l %s %s %s %s '%s%s%s:%s'",
ssh_program, verbose_mode ? " -v" : "",
ssh_options, suser, host, cmd, src,
tuser ? tuser : "", tuser ? "@" : "",
thost, targ);
} else { } else {
host = cleanhostname(argv[i]); host = cleanhostname(argv[i]);
snprintf(bp, len,
"exec %s%s %s -n %s "
"%s %s '%s%s%s:%s'",
ssh_program, verbose_mode ? " -v" : "",
ssh_options, host, cmd, src,
tuser ? tuser : "", tuser ? "@" : "",
thost, targ);
} }
if (verbose_mode) addargs(&alist, "%s", host);
fprintf(stderr, "Executing: %s\n", bp); addargs(&alist, "%s", cmd);
if (system(bp) != 0) addargs(&alist, "%s", src);
addargs(&alist, "%s%s%s:%s",
tuser ? tuser : "", tuser ? "@" : "",
thost, targ);
if (do_local_cmd(&alist) != 0)
errs = 1; errs = 1;
(void) xfree(bp);
} else { /* local to remote */ } else { /* local to remote */
if (remin == -1) { if (remin == -1) {
len = strlen(targ) + CMDNEEDS + 20; len = strlen(targ) + CMDNEEDS + 20;
@ -458,20 +497,23 @@ tolocal(int argc, char **argv)
{ {
int i, len; int i, len;
char *bp, *host, *src, *suser; char *bp, *host, *src, *suser;
arglist alist;
memset(&alist, '\0', sizeof(alist));
alist.list = NULL;
for (i = 0; i < argc - 1; i++) { for (i = 0; i < argc - 1; i++) {
if (!(src = colon(argv[i]))) { /* Local to local. */ if (!(src = colon(argv[i]))) { /* Local to local. */
len = strlen(_PATH_CP) + strlen(argv[i]) + freeargs(&alist);
strlen(argv[argc - 1]) + 20; addargs(&alist, "%s", _PATH_CP);
bp = xmalloc(len); if (iamrecursive)
(void) snprintf(bp, len, "exec %s%s%s %s %s", _PATH_CP, addargs(&alist, "-r");
iamrecursive ? " -r" : "", pflag ? " -p" : "", if (pflag)
argv[i], argv[argc - 1]); addargs(&alist, "-p");
if (verbose_mode) addargs(&alist, "%s", argv[i]);
fprintf(stderr, "Executing: %s\n", bp); addargs(&alist, "%s", argv[argc-1]);
if (system(bp)) if (do_local_cmd(&alist))
++errs; ++errs;
(void) xfree(bp);
continue; continue;
} }
*src++ = 0; *src++ = 0;

8
sftp.c
View File

@ -16,7 +16,7 @@
#include "includes.h" #include "includes.h"
RCSID("$OpenBSD: sftp.c,v 1.69 2005/12/06 22:38:27 reyk Exp $"); RCSID("$OpenBSD: sftp.c,v 1.70 2006/01/31 10:19:02 djm Exp $");
#ifdef USE_LIBEDIT #ifdef USE_LIBEDIT
#include <histedit.h> #include <histedit.h>
@ -1453,8 +1453,9 @@ main(int argc, char **argv)
sanitise_stdfd(); sanitise_stdfd();
__progname = ssh_get_progname(argv[0]); __progname = ssh_get_progname(argv[0]);
memset(&args, '\0', sizeof(args));
args.list = NULL; args.list = NULL;
addargs(&args, "ssh"); /* overwritten with ssh_program */ addargs(&args, ssh_program);
addargs(&args, "-oForwardX11 no"); addargs(&args, "-oForwardX11 no");
addargs(&args, "-oForwardAgent no"); addargs(&args, "-oForwardAgent no");
addargs(&args, "-oPermitLocalCommand no"); addargs(&args, "-oPermitLocalCommand no");
@ -1489,6 +1490,7 @@ main(int argc, char **argv)
break; break;
case 'S': case 'S':
ssh_program = optarg; ssh_program = optarg;
replacearg(&args, 0, "%s", ssh_program);
break; break;
case 'b': case 'b':
if (batchmode) if (batchmode)
@ -1565,7 +1567,6 @@ main(int argc, char **argv)
addargs(&args, "%s", host); addargs(&args, "%s", host);
addargs(&args, "%s", (sftp_server != NULL ? addargs(&args, "%s", (sftp_server != NULL ?
sftp_server : "sftp")); sftp_server : "sftp"));
args.list[0] = ssh_program;
if (!batchmode) if (!batchmode)
fprintf(stderr, "Connecting to %s...\n", host); fprintf(stderr, "Connecting to %s...\n", host);
@ -1578,6 +1579,7 @@ main(int argc, char **argv)
fprintf(stderr, "Attaching to %s...\n", sftp_direct); fprintf(stderr, "Attaching to %s...\n", sftp_direct);
connect_to_server(sftp_direct, args.list, &in, &out); connect_to_server(sftp_direct, args.list, &in, &out);
} }
freeargs(&args);
err = interactive_loop(in, out, file1, file2); err = interactive_loop(in, out, file1, file2);