summaryrefslogtreecommitdiff
path: root/security/smaSHeM
diff options
context:
space:
mode:
authoragc <agc>2013-11-15 05:11:50 +0000
committeragc <agc>2013-11-15 05:11:50 +0000
commit728ca03ead8c754cdb8fd3c3408305c2ba577c80 (patch)
tree757ef35746339c1113107c0162f0543f34455447 /security/smaSHeM
parent89a6e1745c3b58a144f4f0984a835d24c4f3d73a (diff)
downloadpkgsrc-728ca03ead8c754cdb8fd3c3408305c2ba577c80.tar.gz
Initial import of smaSHeM, version 0.4, into the packages collection.
System V shared memory segments created with shmget() are assigned an owner, a group and a set of permissions intended to limit access to the segment to designated processes only. The owner of a shared memory segment can change the ownership and permissions on a segment after its creation using shmctl(). Any subsequent processes that wish to attach to the segment can only do so if they have the appropriate permissions. Once attached, the process can read or write to the segment, as per the permissions that were set when the segment was created. smaSHeM takes advantage of applications that set weak permissions on such segments, allowing an attacker to dump or patch their contents. As discussed in the presentation at 44CON 2013 entitled 'I Miss LSD', in the case of many X11 applications it is possible to extract pixmaps of previously rendered GUI artifacts. When compiled with QtCore linking enabled, smaSHeM aids in that process by brute forcing potentially valid dimensions for the raw pixmap dump.
Diffstat (limited to 'security/smaSHeM')
-rw-r--r--security/smaSHeM/DESCR17
-rw-r--r--security/smaSHeM/Makefile17
-rw-r--r--security/smaSHeM/PLIST6
-rw-r--r--security/smaSHeM/STATUS1
-rw-r--r--security/smaSHeM/distinfo5
5 files changed, 46 insertions, 0 deletions
diff --git a/security/smaSHeM/DESCR b/security/smaSHeM/DESCR
new file mode 100644
index 00000000000..7417baa89d3
--- /dev/null
+++ b/security/smaSHeM/DESCR
@@ -0,0 +1,17 @@
+System V shared memory segments created with shmget() are assigned an
+owner, a group and a set of permissions intended to limit access to
+the segment to designated processes only. The owner of a shared
+memory segment can change the ownership and permissions on a segment
+after its creation using shmctl(). Any subsequent processes that wish
+to attach to the segment can only do so if they have the appropriate
+permissions. Once attached, the process can read or write to the
+segment, as per the permissions that were set when the segment was
+created.
+
+smaSHeM takes advantage of applications that set weak permissions on
+such segments, allowing an attacker to dump or patch their contents.
+As discussed in the presentation at 44CON 2013 entitled 'I Miss LSD',
+in the case of many X11 applications it is possible to extract pixmaps
+of previously rendered GUI artifacts. When compiled with QtCore
+linking enabled, smaSHeM aids in that process by brute forcing
+potentially valid dimensions for the raw pixmap dump.
diff --git a/security/smaSHeM/Makefile b/security/smaSHeM/Makefile
new file mode 100644
index 00000000000..4b5ceefef42
--- /dev/null
+++ b/security/smaSHeM/Makefile
@@ -0,0 +1,17 @@
+# $NetBSD: Makefile,v 1.1.1.1 2013/11/15 05:11:50 agc Exp $
+
+DISTNAME= smaSHeM-0.4
+CATEGORIES= security
+MASTER_SITES= http://labs.portcullis.co.uk/download/
+
+MAINTAINER= agc@NetBSD.org
+HOMEPAGE= http://labs.portcullis.co.uk/tools/smashem/
+COMMENT= System V shared memory segment manipulator
+LICENSE= gnu-gpl-v2
+
+GNU_CONFIGURE= yes
+USE_LANGUAGES+= c c++
+
+AUTO_MKDIRS= yes
+
+.include "../../mk/bsd.pkg.mk"
diff --git a/security/smaSHeM/PLIST b/security/smaSHeM/PLIST
new file mode 100644
index 00000000000..0a0d4740cb2
--- /dev/null
+++ b/security/smaSHeM/PLIST
@@ -0,0 +1,6 @@
+@comment $NetBSD: PLIST,v 1.1.1.1 2013/11/15 05:11:50 agc Exp $
+bin/smaSHeM
+man/man1/smaSHeM.1
+share/doc/smashem/COPYING
+share/doc/smashem/ChangeLog
+share/doc/smashem/INSTALL
diff --git a/security/smaSHeM/STATUS b/security/smaSHeM/STATUS
new file mode 100644
index 00000000000..c9e90a64147
--- /dev/null
+++ b/security/smaSHeM/STATUS
@@ -0,0 +1 @@
+Good to go
diff --git a/security/smaSHeM/distinfo b/security/smaSHeM/distinfo
new file mode 100644
index 00000000000..d55155fc288
--- /dev/null
+++ b/security/smaSHeM/distinfo
@@ -0,0 +1,5 @@
+$NetBSD: distinfo,v 1.1.1.1 2013/11/15 05:11:50 agc Exp $
+
+SHA1 (smaSHeM-0.4.tar.gz) = 2eb22f2db02bd362a350d2d624ac431b1cfadc90
+RMD160 (smaSHeM-0.4.tar.gz) = e968da7aaba5dfdd4050804f88ae08bf840345ab
+Size (smaSHeM-0.4.tar.gz) = 215081 bytes