summaryrefslogtreecommitdiff
path: root/_posts/2016-09-22-buf.pl-update.markdown
diff options
context:
space:
mode:
authorAilin Nemui <ailin@z30a.localdomain>2016-09-26 14:24:23 +0200
committerAilin Nemui <ailin@z30a.localdomain>2016-09-26 14:24:23 +0200
commitb73f9a3ccb3378960f4f930c7d8713ad9069fbd9 (patch)
treebcec7db8892032b424aec67ca834529fcbbedfd0 /_posts/2016-09-22-buf.pl-update.markdown
parent9174c8a14d85ce3274ef42a1aff57a1256f32902 (diff)
downloadirssi.github.io-b73f9a3ccb3378960f4f930c7d8713ad9069fbd9.zip
improve news layout, update buf cve
Diffstat (limited to '_posts/2016-09-22-buf.pl-update.markdown')
-rw-r--r--_posts/2016-09-22-buf.pl-update.markdown49
1 files changed, 5 insertions, 44 deletions
diff --git a/_posts/2016-09-22-buf.pl-update.markdown b/_posts/2016-09-22-buf.pl-update.markdown
index 410d011..460ab0f 100644
--- a/_posts/2016-09-22-buf.pl-update.markdown
+++ b/_posts/2016-09-22-buf.pl-update.markdown
@@ -3,49 +3,10 @@ layout: post
title: "buf.pl update available"
---
-An information disclosure vulnerability was found, reported and fixed
-in the buf.pl script by its author.
+An update to the [buf.pl](//scripts.irssi.org/scripts/buf.pl) script
+has been released. This release fixes an information disclosure
+vulnerability. All users should upgrade to this version.
-CWE Classification: CWE-732, CWE-538
+The updated buf.pl script can be found on [scripts.irssi.org](//scripts.irssi.org).
-### Impact
-
-Other users on the same machine may be able to retrieve the whole
-window contents after /UPGRADE when the buf.pl script is
-loaded. Furthermore, this dump of the windows contents is never
-removed afterwards.
-
-Since buf.pl is also an Irssi core script and we recommended its use
-to retain your window content, many people could potentially be
-affected by this.
-
-Remote users may be able to retrieve these contents when combined with
-other path traversal vulnerabilities in public facing services on that
-machine.
-
-### Detailed analysis
-
-buf.pl restores the scrollbuffer between "/upgrade"s by writing the
-contents to a file, and reading that after the new process was spawned.
-Through that file, the contents of (private) chat conversations may leak to
-other users.
-
-### Mitigating facts
-
-Careful users with a limited umask (e.g. 077) are not affected by this bug.
-However, most Linux systems default to a umask of 022, meaning that files
-written without further restricting the permissions, are readable by any
-user.
-
-### Affected versions
-
-All up to 2.13
-
-### Fixed versions
-
-[buf.pl](//scripts.irssi.org/scripts/buf.pl) 2.20
-
-### Resolution
-
-Update the buf.pl script with the latest version from
-[scripts.irssi.org](//scripts.irssi.org). \ No newline at end of file
+Read the [security advisory](/security/buf_pl_sa_2016.txt).