Return-path: <bugtraq-return-16877-dfurr=ewa.com@securityfocus.com>
Received: from outgoing2.securityfocus.com
	(outgoing.securityfocus.com [205.206.231.26])
	by mail2.ewa.com; Thu, 18 Nov 2004 11:21:10 -0500
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
	by outgoing2.securityfocus.com (Postfix) with QMQP
	id 9F05414371E; Thu, 18 Nov 2004 08:28:59 -0700 (MST)
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Delivered-To: mailing list bugtraq@securityfocus.com
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 715 invoked from network); 18 Nov 2004 05:31:05 -0000
Date: Thu, 18 Nov 2004 12:42:33 +0100 (CET)
From: Hans-Bernhard Broeker <broeker@physik.rwth-aachen.de>
Subject: Re: RX171104 Cscope v15.5 and minors - symlink vulnerability -
 advisory, exploit and patch.
In-reply-to: <20041118012718.78b07d79.research@rexotec.com>
To: rexolab <research@rexotec.com>
Cc: bugtraq@securityfocus.com, cert@cert.org, vuln@secunia.com,
	full-disclosure@lists.netsys.com
Message-id:
 <Pine.LNX.4.44.0411181232570.24977-100000@accip02.physik.rwth-aachen.de>
MIME-version: 1.0
Content-type: TEXT/PLAIN; charset=US-ASCII
Content-transfer-encoding: 7BIT

On Thu, 18 Nov 2004, rexolab wrote:

>    VulnDiscovery:	2003/05/21
>    Release Date :	2004/11/17

Surely you're joking, Mr. Gangstuck.  You can't seriously be telling us
you sat on this for no less than 18 months, without telling anybody about
it.

Actually, I somewhat doubt you even discovered this yourself --- what with
this very bug having been posted to cscope's bugtracker on 2004-11-09.

>    Status       :	vendor has just been notified.

Actually, we've been notified 11 days ago, and apparently not by you.

>    First, the temporary directory (P_tmpdir="/tmp") is badly handled 
>    in every myfopen() internal call.

[... there doesn't seem to be a "second", to that first...]

Anyway, you're right, the vulnerability is there.  Unfortunately your
patch is not quite sufficient to close it, because you overlooked 
that temp2, one of the two predictable filenames, is also used to
construct an output redirection for a shell command run by cscope.

-- 
Hans-Bernhard Broeker (broeker@physik.rwth-aachen.de)
Even if all the snow were burnt, ashes would remain.


