diff options
author | james <james@e7ae566f-a301-0410-adde-c780ea21d3b5> | 2006-04-05 06:01:08 +0000 |
---|---|---|
committer | james <james@e7ae566f-a301-0410-adde-c780ea21d3b5> | 2006-04-05 06:01:08 +0000 |
commit | 07d19ba76c2d1e10d042948b3fb7aa359b194280 (patch) | |
tree | 500ed972b447653dd9fc225519e7d4dfbebf3e51 /options.c | |
parent | Minor fixes for gcc (GCC) 4.0.2 warnings. (diff) | |
download | openvpn-07d19ba76c2d1e10d042948b3fb7aa359b194280.tar.xz |
Security Vulnerability -- An OpenVPN client connecting to a
malicious or compromised server could potentially receive
"setenv" configuration directives from the server which could
cause arbitrary code execution on the client via a LD_PRELOAD
attack. A successful attack appears to require that (a) the
client has agreed to allow the server to push configuration
directives to it by including "pull" or the macro "client" in
its configuration file, (b) the client configuration file uses
a scripting directive such as "up" or "down", (c) the client
succesfully authenticates the server, (d) the server is
malicious or has been compromised and is under the control of
the attacker, and (e) the attacker has at least some level of
pre-existing control over files on the client (this might be
accomplished by having the server respond to a client web request
with a specially crafted file).
The fix is to disallow "setenv" to be pushed to clients from
the server, and to add a new directive "setenv-safe" which is
pushable from the server, but which appends "OPENVPN_" to the
name of each remotely set environmental variable.
git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@983 e7ae566f-a301-0410-adde-c780ea21d3b5
Diffstat (limited to 'options.c')
-rw-r--r-- | options.c | 7 |
1 files changed, 6 insertions, 1 deletions
@@ -3989,9 +3989,14 @@ add_option (struct options *options, } else if (streq (p[0], "setenv") && p[1] && p[2]) { - VERIFY_PERMISSION (OPT_P_SETENV); + VERIFY_PERMISSION (OPT_P_GENERAL); setenv_str (es, p[1], p[2]); } + else if (streq (p[0], "setenv-safe") && p[1] && p[2]) + { + VERIFY_PERMISSION (OPT_P_SETENV); + setenv_str_safe (es, p[1], p[2]); + } else if (streq (p[0], "mssfix")) { VERIFY_PERMISSION (OPT_P_GENERAL); |