On Sun, 2020-07-05 at 17:13 +0100, Dave Howorth wrote:
The problem seems to be that artha has a buffer overflow in its code, which can be exploited by a specifically crafted script -- the python script in that example, for instance -- to DDOS your system. The python script can get into your system by any number of ways: website caches, downloading malicious attachments from emails, etc. The exploit has been in the open since 2018 -- not just alleged, but demonstrated and reproduced using that script -- so I would think it is, by now, rather straightforward for anyone to exploit.
Well, I'd like to reproduce the problem using the script but I don't understand how to. There don't seem to be any instructions for what to do with the script to invoke the bug. Just running the script simply creates the text file. Pasting the script itself into Artha's query box produces a message:
"Regular expression pattern detected "No matches found! Please check your expression and try again."
Pasting the name of the text file, or pasting the contents of the text file both produce the same error message:
"Queried string not found in thesaurus!"
So I don't understand what the alleged bug is, nor do I see a plausible method by which any bug could be invoked by that script without active cooperation from the victim.
Maybe it's just my ignorance and I've missed something somewhere that explains what is supposed to be the problem?
How could the original author or anybody else fix the 'bug' if they can't find out how to invoke it?
I don't know the specifics of exploiting this either, but I wish I could at least point you to an upstream bug report. Alas, there seems to be not even an open, active bugzilla or such. Cheers, -- Atri Bhattacharya Sun 5 Jul 18:23:10 CEST 2020 Sent from openSUSE Tumbleweed on my laptop. -- To unsubscribe, e-mail: opensuse-support+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse-support+owner@opensuse.org