|
|
Subscribe / Log in / New account

Security

X.Org vulnerabilities and responses

On May 2, the folks at Coverity sent out a press release congratulating themselves on having found a serious vulnerability (the "BIGGEST X WINDOW SECURITY HOLE SINCE 2000") in the X.Org server. Articles appeared in the mainstream press on a "new" problem on Linux (and other) systems. Linux users, however, rested easy, secure in the knowledge that this problem, first disclosed on March 20, had been fixed long before. In that context, however, it is interesting to note that the LWN vulnerability entry for this problem shows only three distributor updates, from Fedora, Mandriva, and SUSE.

On the same day as the Coverity announcement, the X.Org developers disclosed another vulnerability which could result in root access for anybody who can access an X server. Seven distributors responded this time, all within three days. The one big name missing from the list of updates this time around is Debian.

At a first glance, it would appear that a number of distributions remain vulnerable to the first problem, and Debian still has to update both. The real situation is rather better than that, but it still merits a look. Perhaps there is a lesson or two here.

The first vulnerability remains unpatched by a number of distributors, including Gentoo, Red Hat, Slackware, and Ubuntu. They have a good excuse, though: they all ship X.Org 6.8.2, and this problem was introduced in version 6.9.0. These distributors, having not shipped the vulnerable code in the first place, just didn't feel the need to rush out an update. It is hard to fault these distributors for relaxing in the knowledge that they had dodged that particular bullet, but, at the same time, it seems likely that at least some of their users were wondering where the update was - especially after the Coverity press release came out. It would cost distributors very little to issue an advisory saying "we are not vulnerable" in cases like this. The additional peace of mind for users would be more than worth it.

The second vulnerability, which does affect all X.Org users, elicited a nearly immediate response from most distributors. The one exception is Debian, and therein lies a different story.

Debian's stable distribution does not include X.Org at all. Instead, this much-delayed release went out last year with the old XFree86 code - Debian is the last major distribution to ship that code. Your editor downloaded the XFree86 4.3.0 source, dusted off the cobwebs, and was able to convince himself that the X.Org buffer overflow vulnerability is not present there. So Debian did not need to issue an update, though, once again, a "don't worry" advisory would not have hurt. For those using X.Org via Debian backports, an update (based on the Ubuntu patch) has been made available.

The fact that vulnerabilities have been found in X.Org, rather than XFree86, should not be seen as an indication that X.Org is a buggier product. Instead, these disclosures reflect the fact that the X.Org code is receiving a much higher level of scrutiny. It is doubtful that the XFree86 code is free of vulnerabilities; it is just that few people are looking for them. A quick glance at the XFree86 changelog shows a couple of surprising things:

  • Development of XFree86 has not stopped, though it does not appear to be moving forward at any great pace.

  • There are a number of entries like "fix an array overrun," "fix a double-free problem," and numerous attempts to deal with "xterm's setgid issue" - all since March. These have the look of security-related problems, but no advisories have been issued. Whether any of them are relevant to Debian's archaic 4.3.0 version is unclear. Equally unclear, however, is whether anybody is watching this stream of fixes to see whether Debian should be issuing updates; the current Debian package was uploaded last August.

Replacing something as fundamental as the X distribution in a stable Debian release is a daunting prospect, so it is not surprising that XFree86 remains in place after all this time. To rely on such musty old software has its risks, however. In less than one year, the Debian "etch" release should sweep XFree86 off of its remaining Linux desktops. In the mean time, Debian users are running a crucial package which few people actively care about.

Comments (13 posted)

New vulnerabilities

busybox: insecure password generation

Package(s):busybox CVE #(s):CVE-2006-1058
Created:May 5, 2006 Updated:May 2, 2007
Description: The BusyBox 1.1.1 passwd command does not use a proper salt when generating passwords. This would create an instance where a brute force attack could take very little time.
Alerts:
Red Hat RHSA-2007:0244-02 busybox 2007-05-01
Fedora FEDORA-2006-511 busybox 2006-05-04
Fedora FEDORA-2006-510 busybox 2006-05-04

Comments (2 posted)

cgiirc: buffer overflows

Package(s):cgiirc CVE #(s):CVE-2006-2148
Created:May 8, 2006 Updated:May 10, 2006
Description: Several buffer overflows have been discovered in cgiirc, a web-based IRC client, which could be exploited to execute arbitrary code.
Alerts:
Debian DSA-1052-1 cgiirc 2006-05-08

Comments (none posted)

mozilla firefox: potential remote code execution

Package(s):mozilla firefox CVE #(s):CVE-2006-1993
Created:May 8, 2006 Updated:May 12, 2006
Description: Martijn Wargers and Nick Mott discovered a vulnerability in firefox 1.5 when rendering malformed JavaScript content. The Mozilla Firefox 1.0 line is not affected.
Alerts:
Fedora FEDORA-2006-547 firefox 2006-05-12
Debian DSA-1055-1 mozilla-firefox 2006-05-11
Debian DSA-1053-1 mozilla 2006-05-09
Gentoo 200605-06 firefox 2006-05-06

Comments (none posted)

kernel: multiple vulnerabilities

Package(s):kernel CVE #(s):CVE-2006-1863 CVE-2006-1527
Created:May 4, 2006 Updated:May 10, 2006
Description: Several kernel vulnerabilities have been fixed, including a problem with a backslash character in a path component and an infinite loop in the NETFILTER SCTP conntrack code.
Alerts:
Fedora FEDORA-2006-517 kernel 2006-05-05
Fedora FEDORA-2006-516 kernel 2006-05-05
Fedora FEDORA-2006-499 kernel 2006-05-03
Fedora FEDORA-2006-500 kernel 2006-05-03

Comments (none posted)

mysql: information leaks

Package(s):mysql mysql-dfsg CVE #(s):CVE-2006-1516 CVE-2006-1517
Created:May 8, 2006 Updated:June 23, 2006
Description: Stefano Di Paola discovered an information leak in the login packet parser. By sending a specially crafted malformed login packet, a remote attacker could exploit this to read a random piece of memory, which could potentially reveal sensitive data. (CVE-2006-1516)

Stefano Di Paola also found a similar information leak in the parser for the COM_TABLE_DUMP request. (CVE-2006-1517)

Alerts:
SuSE SUSE-SA:2006:036 mysql 2006-06-23
Debian DSA-1079-1 mysql-dfsg 2006-05-29
Debian DSA-1073-1 mysql-dfsg-4.1 2006-05-22
Debian DSA-1071-1 mysql 2006-05-22
Fedora FEDORA-2006-553 mysql 2006-05-17
Fedora FEDORA-2006-554 mysql 2006-05-17
Gentoo 200605-13 mysql 2006-05-11
Slackware SSA:2006-129-02 mysql 2006-05-10
Mandriva MDKSA-2006:084 MySQL 2006-05-10
Ubuntu USN-283-1 mysql-dfsg-4.1, mysql-dfsg 2006-05-08

Comments (1 posted)

nagios: buffer overflow

Package(s):nagios CVE #(s):CVE-2006-2162
Created:May 8, 2006 Updated:May 31, 2006
Description: A buffer overflow in CGI scripts in Nagios 1.x before 1.4 and 2.x before 2.3 allows remote attackers to execute arbitrary code via a negative content length (Content-Length) HTTP header.
Alerts:
Ubuntu USN-287-1 nagios 2006-05-29
Debian DSA-1072-1 nagios 2006-05-22
SuSE SUSE-SR:2006:011 nagios, avahi, pound 2006-05-19
Gentoo 200605-07a nagios-core 2006-05-07
Ubuntu USN-282-1 nagios 2006-05-08
Gentoo 200605-07 nagios-core 2006-05-07

Comments (none posted)

pdnsd: buffer overflow

Package(s):pdnsd CVE #(s):CVE-2006-2076 CVE-2006-2077
Created:May 10, 2006 Updated:May 10, 2006
Description: Versions of pdnsd (a proxy DNS server) prior to 1.2.4 suffer from a remotely exploitable buffer overflow vulnerability.
Alerts:
Gentoo 200605-10 pdnsd 2006-05-10

Comments (none posted)

quake: buffer overflow

Package(s):quake3-bin CVE #(s):CVE-2006-2236
Created:May 10, 2006 Updated:January 12, 2009
Description: Games based on the Quake 3 engine are vulnerable to a buffer overflow exploitable by a hostile game server.
Alerts:
Gentoo 200901-06 tremulous 2009-01-11
Gentoo 200605-12 quake3-bin 2006-05-10

Comments (none posted)

rsync: integer overflow

Package(s):rsync CVE #(s):CVE-2006-2083
Created:May 8, 2006 Updated:June 6, 2006
Description: An integer overflow in the receive_xattr function in the extended attributes patch (xattr.c) for rsync before 2.6.8 might allow attackers to execute arbitrary code via crafted extended attributes that trigger a buffer overflow.
Alerts:
Fedora FEDORA-2006-599 rsync 2006-06-05
Fedora FEDORA-2006-601 rsync 2006-06-05
Gentoo 200605-05 rsync 2006-05-06

Comments (none posted)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2006, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds