wesnoth exploit allows others to view the content of files on a remote computer

Bug #172783 reported by Miguel Martinez
256
Affects Status Importance Assigned to Milestone
wesnoth (Ubuntu)
Fix Released
High
Emilio Pozuelo Monfort
Dapper
Fix Released
Undecided
Stephan Rügamer
Edgy
Fix Released
Undecided
Stephan Rügamer
Feisty
Fix Released
High
Kees Cook
Gutsy
Fix Released
High
Kees Cook

Bug Description

Binary package hint: wesnoth

I reproduce the relevant part of the forum thread regarding the release of Wesnoth 1.2.8:

"This is a bugfix release for 1.2 and it is compatible with the other 1.2 versions. The main reason for this release was an important security fix. This issue was filed as CVE-2007-5742, it did allow others to view the content of files on the remote computer. We did now fix this problem by removing the option to use ../ in paths. "

Furthermore, I add the Secunia vulnerability link:
http://secunia.com/advisories/27786/

I'm sorry if this has been reported before, but better safe than sorry. The only related thing I saw was bug #158414 and it is fixed.

PS: The full Wesnoth release thread is available here:
http://www.wesnoth.org/forum/viewtopic.php?p=264289#264289

Revision history for this message
Miguel Martinez (el-quark) wrote :

I unchecked the privacy of the bug since it's a known one, and has been mentioned at least at happypenguin.org, secunia and the wesnoth forums. I considered thus that keeping this bug hidden would't contribute anything.

Revision history for this message
Emilio Pozuelo Monfort (pochu) wrote :

I'm working on this.

Changed in wesnoth:
assignee: nobody → pochu
importance: Undecided → High
status: New → In Progress
Revision history for this message
Emilio Pozuelo Monfort (pochu) wrote :

I prepared this package:
http://emilio.pozuelo.org/~deb/wesnoth_1.2.8-0ubuntu1.dsc

But Debian has merged our changes, so we can sync their version. The problem is that it's waiting in the NEW queue, so it will take some days.

Revision history for this message
Miguel Martinez (el-quark) wrote : Re: [Bug 172783] Re: wesnoth exploit allows others to view the content of files on a remote computer

It's OK, don't worry. I don't really think two days will make or break
a system, as it's a game. Thank you very much for your efforts.

Revision history for this message
Emilio Pozuelo Monfort (pochu) wrote :

I've requested a sync from Debian in bug #173494 which will address the vulnerability in Hardy.

Revision history for this message
Emilio Pozuelo Monfort (pochu) wrote :
Revision history for this message
Emilio Pozuelo Monfort (pochu) wrote :

This debdiff fixes the Gutsy vulnerability.

Revision history for this message
Emilio Pozuelo Monfort (pochu) wrote :
Revision history for this message
Emilio Pozuelo Monfort (pochu) wrote :

This debdiff addresses this bug and bug #158414.

Revision history for this message
Emilio Pozuelo Monfort (pochu) wrote :

The security updates are available for Gutsy and Feisty at https://launchpad.net/~pochu/+archive

Please, test them and let us know whether they work fine. We need some testing to get them in the security repository. So start the game, and see that things work properly (menus, start a campaign, start multiplayer...).

Thanks in advance,
Emilio

Revision history for this message
Kees Cook (kees) wrote :

Thanks for preparing these! I've uploaded them to the security queue. They should be published shortly.

Changed in wesnoth:
assignee: nobody → keescook
importance: Undecided → High
status: New → Fix Committed
status: In Progress → Triaged
assignee: nobody → keescook
importance: Undecided → High
status: New → Fix Committed
status: Triaged → Fix Committed
Revision history for this message
Emilio Pozuelo Monfort (pochu) wrote :

wesnoth (1.2.6-1ubuntu2.2) gutsy-security; urgency=low

  * SECURITY UPDATE: Do not allow '../' in file paths. It allowed others
    to view the content of files in the remote computers.
  * debian/patches/CVE-2007-5742: added, taken from upstream SVN r21904.
  * References:
    CVE-2007-5742.
    LP: #172783.

 -- Emilio Pozuelo Monfort <email address hidden> Sun, 02 Dec 2007 21:30:03 +0100

Revision history for this message
Emilio Pozuelo Monfort (pochu) wrote :

wesnoth (1.2.3-0ubuntu1.1) feisty-security; urgency=low

  * SECURITY UPDATE: Fix insecure truncate of a multibyte chat message that
    can lead to invalid utf-8 and throw an uncaught exception. Both wesnoth
    client and server are affected.
  * debian/patches/CVE-2007-3917: added, taken from Debian.
  * References: CVE-2007-3917.
    LP: #158414.

  * SECURITY UPDATE: Do not allow '../' in file paths. It allowed others
    to view the content of files in the remote computers.
  * debian/patches/CVE-2007-5742: added, taken from upstream SVN r21904.
  * References:
    CVE-2007-5742.
    LP: #172783.

 -- Emilio Pozuelo Monfort <email address hidden> Sun, 02 Dec 2007 22:07:37 +0100

Changed in wesnoth:
status: Fix Committed → Fix Released
status: Fix Committed → Fix Released
Revision history for this message
Emilio Pozuelo Monfort (pochu) wrote :

1.2.8 has been synced to Hardy.

Changed in wesnoth:
status: Fix Committed → Fix Released
Revision history for this message
Stephan Rügamer (sruegamer) wrote :

Edgy and Dapper are still vulnerable.

I'm preparing some fixes for wesnoth regarding https://bugs.edge.launchpad.net/ubuntu/+source/wesnoth/+bug/173881,
you'll find at least for edgy (and hopefully dapper) the fixes inside the debdiffs, as well the latest CVE mentioned in the bug above

Kees Cook (kees)
Changed in wesnoth:
assignee: nobody → shermann
status: New → In Progress
assignee: nobody → shermann
status: New → In Progress
Changed in wesnoth:
status: In Progress → Fix Released
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.