mailing list of musl libc
 help / color / mirror / code / Atom feed
* gethostbyname buffer overflow (glibc)
@ 2015-01-27 16:59 Daniel Cegiełka
  2015-01-27 17:10 ` Rich Felker
  0 siblings, 1 reply; 3+ messages in thread
From: Daniel Cegiełka @ 2015-01-27 16:59 UTC (permalink / raw)
  To: musl

eg from:

http://www.openwall.com/lists/oss-security/2015/01/27/9

# gcc ghost.c && ./a.out
should not happen


  retval = gethostbyname_r(name, &resbuf, temp.buffer,
sizeof(temp.buffer), &result, &herrno);

  if (strcmp(temp.canary, CANARY) != 0) {
    puts("vulnerable");
    exit(EXIT_SUCCESS);
  }
  if (retval == ERANGE) {
    puts("not vulnerable");
    exit(EXIT_SUCCESS);
  }
  puts("should not happen");
  exit(EXIT_FAILURE);

Double exit. Is something wrong with gethostbyname_r() in musl?

Daniel


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: gethostbyname buffer overflow (glibc)
  2015-01-27 16:59 gethostbyname buffer overflow (glibc) Daniel Cegiełka
@ 2015-01-27 17:10 ` Rich Felker
  2015-01-27 17:23   ` Daniel Cegiełka
  0 siblings, 1 reply; 3+ messages in thread
From: Rich Felker @ 2015-01-27 17:10 UTC (permalink / raw)
  To: musl

On Tue, Jan 27, 2015 at 05:59:36PM +0100, Daniel Cegiełka wrote:
> eg from:
> 
> http://www.openwall.com/lists/oss-security/2015/01/27/9
> 
> # gcc ghost.c && ./a.out
> should not happen
> 
> 
>   retval = gethostbyname_r(name, &resbuf, temp.buffer,
> sizeof(temp.buffer), &result, &herrno);
> 
>   if (strcmp(temp.canary, CANARY) != 0) {
>     puts("vulnerable");
>     exit(EXIT_SUCCESS);
>   }
>   if (retval == ERANGE) {
>     puts("not vulnerable");
>     exit(EXIT_SUCCESS);
>   }
>   puts("should not happen");
>   exit(EXIT_FAILURE);
> 
> Double exit. Is something wrong with gethostbyname_r() in musl?

I'm not sure what you mean by "double exit". As far as I can tell,
musl just detects errors in a different order, and returns ENOENT (2)
rather than ERANGE because the name is not valid.

Rich


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: gethostbyname buffer overflow (glibc)
  2015-01-27 17:10 ` Rich Felker
@ 2015-01-27 17:23   ` Daniel Cegiełka
  0 siblings, 0 replies; 3+ messages in thread
From: Daniel Cegiełka @ 2015-01-27 17:23 UTC (permalink / raw)
  To: musl

2015-01-27 18:10 GMT+01:00 Rich Felker <dalias@libc.org>:
> On Tue, Jan 27, 2015 at 05:59:36PM +0100, Daniel Cegiełka wrote:
>> eg from:
>>
>> http://www.openwall.com/lists/oss-security/2015/01/27/9
>>
>> # gcc ghost.c && ./a.out
>> should not happen
>>
>>
>>   retval = gethostbyname_r(name, &resbuf, temp.buffer,
>> sizeof(temp.buffer), &result, &herrno);
>>
>>   if (strcmp(temp.canary, CANARY) != 0) {
>>     puts("vulnerable");
>>     exit(EXIT_SUCCESS);
>>   }
>>   if (retval == ERANGE) {
>>     puts("not vulnerable");
>>     exit(EXIT_SUCCESS);
>>   }
>>   puts("should not happen");
>>   exit(EXIT_FAILURE);
>>
>> Double exit. Is something wrong with gethostbyname_r() in musl?
>
> I'm not sure what you mean by "double exit".

ghost.c return EXIT_FAILURE instead EXIT_SUCCESS, which is checked in
two cases (only)...

> As far as I can tell,
> musl just detects errors in a different order, and returns ENOENT (2)
> rather than ERANGE because the name is not valid.

... and yes, ghost.c should also check the other errors.

thx

> Rich


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2015-01-27 17:23 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-01-27 16:59 gethostbyname buffer overflow (glibc) Daniel Cegiełka
2015-01-27 17:10 ` Rich Felker
2015-01-27 17:23   ` Daniel Cegiełka

Code repositories for project(s) associated with this public inbox

	https://git.vuxu.org/mirror/musl/

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).