-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2015-3887 - RPATH flaw #60
Comments
Thanks for the information. It is a feature of proxychains-ng to allow the user to preload the DSO from the current directory. I understand though that with more and more mainstream distros adopting proxychains-ng it is probably better to ship with more "defensive" default settings. I'm currently thinking about the best way to achieve that, probably with a compile-time switch. |
Well, I already told Pranav that when building proxychains-ng (before installing), libproxychains4.so and proxychains are created on the same directory, and when trying to use proxychains4 on the build directory (as ./proxychains4), libproxychains4 on the same directory is loaded, because of own_dir entry, so there should be no problem when trying to use proxychains4 on the build directory (without installing). On the contrary, allowing arbitrary "." is security flaw. In this sense, Or you can use realpath(argv0, NULL) |
Note that realpath() resolves symlink, so using realpath() avoilds symlink attack. |
Version 4.9 fixes CVE-2015-3887: rofl0r/proxychains-ng#60 Added md5 & sha1 hashes provided by upstream. Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Version 4.9 fixes CVE-2015-3887: rofl0r/proxychains-ng#60 Added md5 & sha1 hashes provided by upstream. Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by: Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit 9d71b89) Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Version 4.9 fixes CVE-2015-3887: rofl0r/proxychains-ng#60 Added md5 & sha1 hashes provided by upstream. Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by: Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit 9d71b89) Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
https://github.com/rofl0r/proxychains-ng/blob/master/src/main.c#L35
This line loads libproxychains4.so from the current directory which can be used by the attacker to load a manipulated library instead of original libproxychains4.so
ref:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3887
http://seclists.org/oss-sec/2015/q2/415
http://seclists.org/oss-sec/2015/q2/430
The text was updated successfully, but these errors were encountered: