diff options
author | Ailin Nemui <ailin@z30a.localdomain> | 2016-09-26 14:24:23 +0200 |
---|---|---|
committer | Ailin Nemui <ailin@z30a.localdomain> | 2016-09-26 14:24:23 +0200 |
commit | b73f9a3ccb3378960f4f930c7d8713ad9069fbd9 (patch) | |
tree | bcec7db8892032b424aec67ca834529fcbbedfd0 /_posts/2016-09-22-buf.pl-update.markdown | |
parent | 9174c8a14d85ce3274ef42a1aff57a1256f32902 (diff) | |
download | irssi.github.io-b73f9a3ccb3378960f4f930c7d8713ad9069fbd9.zip |
improve news layout, update buf cve
Diffstat (limited to '_posts/2016-09-22-buf.pl-update.markdown')
-rw-r--r-- | _posts/2016-09-22-buf.pl-update.markdown | 49 |
1 files changed, 5 insertions, 44 deletions
diff --git a/_posts/2016-09-22-buf.pl-update.markdown b/_posts/2016-09-22-buf.pl-update.markdown index 410d011..460ab0f 100644 --- a/_posts/2016-09-22-buf.pl-update.markdown +++ b/_posts/2016-09-22-buf.pl-update.markdown @@ -3,49 +3,10 @@ layout: post title: "buf.pl update available" --- -An information disclosure vulnerability was found, reported and fixed -in the buf.pl script by its author. +An update to the [buf.pl](//scripts.irssi.org/scripts/buf.pl) script +has been released. This release fixes an information disclosure +vulnerability. All users should upgrade to this version. -CWE Classification: CWE-732, CWE-538 +The updated buf.pl script can be found on [scripts.irssi.org](//scripts.irssi.org). -### Impact - -Other users on the same machine may be able to retrieve the whole -window contents after /UPGRADE when the buf.pl script is -loaded. Furthermore, this dump of the windows contents is never -removed afterwards. - -Since buf.pl is also an Irssi core script and we recommended its use -to retain your window content, many people could potentially be -affected by this. - -Remote users may be able to retrieve these contents when combined with -other path traversal vulnerabilities in public facing services on that -machine. - -### Detailed analysis - -buf.pl restores the scrollbuffer between "/upgrade"s by writing the -contents to a file, and reading that after the new process was spawned. -Through that file, the contents of (private) chat conversations may leak to -other users. - -### Mitigating facts - -Careful users with a limited umask (e.g. 077) are not affected by this bug. -However, most Linux systems default to a umask of 022, meaning that files -written without further restricting the permissions, are readable by any -user. - -### Affected versions - -All up to 2.13 - -### Fixed versions - -[buf.pl](//scripts.irssi.org/scripts/buf.pl) 2.20 - -### Resolution - -Update the buf.pl script with the latest version from -[scripts.irssi.org](//scripts.irssi.org).
\ No newline at end of file +Read the [security advisory](/security/buf_pl_sa_2016.txt). |