Tripwire(tm) is a "Security, Intrusion Detection, Damage Assessment and Recovery, Forensics software". A vulnerability in the product allows a user on the local machine under certain circumstances to execute arbitrary code with the rights of the user running the program (typically root).
The information has been provided by Paul Herman.
* Tripwire commercial versions prior and including 2.4
* Tripwire open source versions prior and including 2.3.1
A format string vulnerability exists when tripwire generates an email report (i.e. 'tripwire -m c -M'). Each line of the report is passed to an fprintf() function in pipedmailmessage.cpp in the following manner: fprintf(mpFile, s.c_str() );
If a local user were to create a file with a carefully crafted filename on the local system, that filename may be included in the report and passed to fprintf() (albeit from the heap.) No exploit is known at this time, but the author of this advisory believes this vulnerability could be exploitable.
Tripwire Inc. has been notified and has implemented a fix.
This vulnerability allows an attacker to execute arbitrary code with the rights of the user running the file check, which is typically root. The vulnerability exists only when tripwire is used to generate an email report. Users who do not generate an email report are not affected by this vulnerability.
Disable email reporting. All users are advised to upgrade to a version that is not vulnerable.
If you are using Open Source Tripwire(tm) version 2.3.1, the following patch will fix this particular issue:
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- src/tripwire/pipedmailmessage.cpp 21 Jan 2001 00:46:48 -0000 1.1
+++ src/tripwire/pipedmailmessage.cpp 26 May 2004 20:59:15 -0000 1.2
@@ -180,7 +180,7 @@