eggdrop/windrop remote crash vulnerability

Bug #377054 reported by Savvas Radevic
260
This bug affects 1 person
Affects Status Importance Assigned to Milestone
eggdrop (Debian)
Fix Released
Unknown
eggdrop (Ubuntu)
Fix Released
Low
Unassigned
Dapper
Invalid
Undecided
Unassigned
Hardy
Fix Released
Low
Unassigned
Intrepid
Fix Released
Low
Unassigned
Jaunty
Fix Released
Low
Unassigned
Karmic
Fix Released
Low
Unassigned

Bug Description

Binary package hint: eggdrop

Incomplete patch from bug #180974

Affected software
-----------------

eggdrop (1.6.19 only, not 1.6.19+ctcpfix)
windrop (1.6.19 only, not 1.6.19+ctcpfix)
all eggdrop/windrop versions and packages which apply Nico Goldes
patch for CVE-2007-2807/SA25276 See: [1]

http://seclists.org/fulldisclosure/2009/May/0128.html
http://www.irc-junkie.org/2009-05-15/vulnerability-in-eggdrop-windrop-1619/

Debian has already issued the new patch:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=528778

[1] http://bugzilla.eggheads.org/show_bug.cgi?id=462
    http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=427157
    http://www.securityfocus.com/bid/24070
    http://secunia.com/advisories/25276
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2807

Revision history for this message
Savvas Radevic (medigeek) wrote :

The new release is announced here: http://www.eggheads.org/news/2009/05/14/35

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Thank you for using Ubuntu and taking the time to report a bug. This package is in universe and is community supported. If you are able, perhaps you could prepare debdiffs to fix this by following https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures.

visibility: private → public
Changed in eggdrop (Ubuntu):
status: New → Confirmed
importance: Undecided → Low
Revision history for this message
Savvas Radevic (medigeek) wrote : Re: [Bug 377054] Re: eggdrop/windrop remote crash vulnerability

I can try, but I'm not at home unfortunately, perhaps tomorrow - if
anyone wants to do this, be my guest! :)

Changed in eggdrop (Debian):
status: Unknown → Fix Released
Changed in eggdrop (Ubuntu):
status: Confirmed → In Progress
Revision history for this message
Savvas Radevic (medigeek) wrote :
Revision history for this message
Savvas Radevic (medigeek) wrote :
Revision history for this message
Savvas Radevic (medigeek) wrote :

I hope these are ok. :)

I can't test them at the moment (maybe in about 4 days when I go back home).
The packages build fine:
https://launchpad.net/~medigeek/+archive/experimental/+sourcepub/631791/+listing-archive-extra
https://launchpad.net/~medigeek/+archive/experimental/+sourcepub/631790/+listing-archive-extra
(Note: in the patch I used -security, in the PPA I uploaded without it)

Changed in eggdrop (Ubuntu):
status: In Progress → Confirmed
Revision history for this message
Kees Cook (kees) wrote :

Does not seem to affect Dapper.

Changed in eggdrop (Ubuntu):
status: Confirmed → In Progress
Changed in eggdrop (Ubuntu Jaunty):
importance: Undecided → Low
status: New → In Progress
Changed in eggdrop (Ubuntu Dapper):
status: New → Invalid
Changed in eggdrop (Ubuntu Intrepid):
importance: Undecided → Low
status: New → In Progress
Changed in eggdrop (Ubuntu Hardy):
importance: Undecided → Low
status: New → In Progress
Revision history for this message
Kees Cook (kees) wrote :

Hi! Thanks very much for the debdiffs. There are a few suggestions I'd like to make:
 - the versioning is almost perfect, but needs to be higher than the existing versions. Instead of 1.6.19-1.1ubuntu0.9.04.1, you'd want 1.6.19-1.1ubuntu1.9.04.1 since 1.6.19-1.1ubuntu1 is already in the archive and higher than 1.6.19-1.1ubuntu0.9.04.1. The distro-numbering is right on, though. :)
 - we tend to prefer that patches carry Description, Ubuntu, Upstream, and sometimes Patch tags, as detailed here: https://wiki.ubuntu.com/UbuntuDevelopment/PatchTaggingGuidelines

I'm updating the packaging and patches and will upload this shortly. Thanks again!

Revision history for this message
Savvas Radevic (medigeek) wrote :

You believe it affects Hardy, 1.6.18?
By the way, about Karmic, I have opened a request for merge: bug #377247
Should I close it?

Revision history for this message
Kees Cook (kees) wrote :

Yes, hardy's changelog appears to have the same partial patch mentioned, so I assume it is vulnerable as well. I've just uploaded the merge for Karmic, so I've closed the other bug too.

Changed in eggdrop (Ubuntu Karmic):
status: In Progress → Fix Released
Changed in eggdrop (Ubuntu Jaunty):
status: In Progress → Fix Committed
Changed in eggdrop (Ubuntu Intrepid):
status: In Progress → Fix Committed
Changed in eggdrop (Ubuntu Hardy):
status: In Progress → Confirmed
Revision history for this message
Savvas Radevic (medigeek) wrote :

> - the versioning is almost perfect, but needs to be higher than the existing versions. Instead of 1.6.19-1.1ubuntu0.9.04.1, you'd want 1.6.19-1.1ubuntu1.9.04.1 since 1.6.19-1.1ubuntu1 is already in the archive and higher than 1.6.19-1.1ubuntu0.9.04.1. The distro-numbering is right on, though. :)

I knew I forgot something heh :P
Thanks for the tagging tip, I didn't know that and, of course, thanks
for taking care of it!

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package eggdrop - 1.6.19-1.1ubuntu1.8.10.1

---------------
eggdrop (1.6.19-1.1ubuntu1.8.10.1) intrepid-security; urgency=low

  * SECURITY UPDATE: Incomplete patch for CVE-2007-2807, buffer can still
    overflow in case of strlen(ctcpbuf) returning zero (LP: #377054)
    - debian/patches/02_incompCVE-2007-2807.patch: Use memmove instead of
      strncpy to avoid buffer overflow. Patch from Debian.
    - CVE-2007-2807

 -- Savvas Radevic <email address hidden> Fri, 15 May 2009 20:58:58 +0100

Changed in eggdrop (Ubuntu Intrepid):
status: Fix Committed → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package eggdrop - 1.6.19-1.1ubuntu1.9.04.1

---------------
eggdrop (1.6.19-1.1ubuntu1.9.04.1) jaunty-security; urgency=low

  * SECURITY UPDATE: Incomplete patch for CVE-2007-2807, buffer can still
    overflow in case of strlen(ctcpbuf) returning zero (LP: #377054)
    - debian/patches/02_incompCVE-2007-2807.patch: Use memmove instead of
      strncpy to avoid buffer overflow. Patch from Debian.
    - CVE-2007-2807

 -- Savvas Radevic <email address hidden> Fri, 15 May 2009 20:58:58 +0100

Changed in eggdrop (Ubuntu Jaunty):
status: Fix Committed → Fix Released
Revision history for this message
Brian Thomason (brian-thomason) wrote :
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

ACK, though it took me a minute to figure that the patch removed 01_CVE-2007-2807_servmsg.patch to replace it with CVE-2007-2807.patch. Brian, in the future please either update the existing patch or give instructions in the bug that '-E' should be used when applying the debdiff. These changes should also be mentioned in the changedlog-- ie, that you removed one patch file and are using another or that you updated an existing patch. Also, please be clear on the origin of the patch-- I see that it came from Debian Etch, but the changelog does not mention that and the patch itself does not follow DEP-3 (which is preferred).

Changed in eggdrop (Ubuntu Hardy):
status: Confirmed → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package eggdrop - 1.6.18-1.1ubuntu1.1

---------------
eggdrop (1.6.18-1.1ubuntu1.1) hardy-security; urgency=low

  * SECURITY UPDATE: Fix buffer overflows (LP: #377054)
  - debian/patches/CVE-2007-2807.patch: Former patch was not fully applied.
    This patch now fully applies the previous fix for a stack based
    buffer-iverflow and also fixes a potential buffer-overflow in case
    strlen(ctcpbuf) returns 0.
  - CVE-2007-2807
  - CVE-2009-1789
 -- Brian Thomason <email address hidden> Wed, 30 Jun 2010 14:29:24 -0400

Changed in eggdrop (Ubuntu Hardy):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.