|
|
Log in / Subscribe / Register

Security

Security processes and the X.org flaw

January 25, 2012

This article was contributed by Michael Gilbert

A recent X.org security flaw (CVE-2012-0064) was handled well by those involved by many measures (by the issue discloser, by the X.org developers, and by various distribution security response teams). In fact, the issue was fixed in less than a day by most distributions, which helps demonstrate the progress that the open source community has made in terms of security processes and practices.

On January 19th, Gu1 (a member of the Consortium of Pwners computer security war gaming group) published details of a flaw he happened to come across in the latest X.org release. By pressing a particular combination of keys when sitting locally at any machine running X.org 1.11 or greater (and a subset of release candidates), he found that he could terminate any application with a current screen grab (i.e. screensavers). This meant that he, or anyone else with knowledge of that particular "code", would be able to gain local access to machines for which they did not have appropriate credentials. Some readers may be tempted to jump to the conclusion that such a simple "code" is a sign of a maliciously placed back-door, but the actual explanation is far more mundane. This particular key combination simply happens to be a debugging feature — with known and documented security implications — that, by default, was appropriately disabled in the past.

Fortunately X.org 1.11 is currently so new that it hasn't yet shipped in most distributions. Of the most common GNU/Linux distributions, the only stable release affected was Fedora 16. Also affected were Debian testing and unstable as well as Arch, all of which are either rolling or experimental releases. All Ubuntu, RedHat (including CentOS, of course), and openSUSE releases were not affected. So, first of all, there isn't much for most users to worry about with respect to this particular problem. However, the events leading up to and following publication of the flaw paint an interesting picture. In one sense, this flaw was handled well by the security teams of the affected distributions, but that doesn't mean there isn't room for improvement.

Note that a comprehensive discussion on the technical details of the flaw itself will not be included here. Peter Hutterer has already written an excellent blog entry on the matter, and readers are encouraged to visit his site for more information. Succinctly, the screen grab debugging key-press combinations have now been removed from the default XKB keymap configuration files. It is still possible to re-enable them, but that requires a determined user that presumably knows what they are doing.

Timeline of the flaw

In the beginning (1984), X was written. At some point, developers recognized a need to be able to debug screen grabbing applications, so they wrote some code to be able to break such grabs. A screen grab (in X.org speak) is simply a top-level overlay on the screen that prevents events (key and mouse presses) from touching the windows underneath. The grab breaks were assigned to the Control+Alt+KeypadMultiply and Control+Alt+KeypadDivide key-press combinations. At the time, the X developers recognized the security implications and made it a non-default option. They even documented the problem to hopefully make it very clear to users.

Many years passed...

In 2008, there was a great purge of xf86misc (a code clean up effort that removed various unused X code that had accumulated over many years), which, along with many other things, excised those particular debugging options (Daniel Stone's commit, commit). Recently, Daniel has been working on multi-pointer X. In that process, he encountered quite a few situations where screen grab debugging would be helpful. So, he dusted of that code and pushed for its re-inclusion. In June of 2011, Peter Hutterer reviewed and applied said patch.

However, lost in translation/communication (and to the passage of time) was the fact that the code did indeed have security implications. That fact was not picked up on until around January 5th on a day that Gu1 found himself rather bored. On that day, he had decided to read some older X.org documentation, and in particular, he came across "AllowClosedownGrabs", which documented the Control-Alt-KeypadMultiply key combination. He decided to try it with the latest X.org expecting nothing, but to his surprise it worked. So, part of the problem was that the documentation that warned about security considerations of the code was not brought back as well. It still doesn't look like this has returned yet, but an important takeaway is that both code and documentation should be brought back on returning features, and that the discussion in that documentation should be taken into consideration when doing so. One solution could be to remove documentation in the same commit that the code is removed. That way if the commit is ever reverted, the documentation automatically comes back as well.

Not content with only finding the issue, Gu1 took the time to write a rather detailed blog entry, and published that two weeks later on January 19th. He even went so far as to research, bisect, and identify the commit introducing the problem. This is an example of a well-written disclosure. It made it possible for security teams to take rapid action to close the issue. In an email interview with Gu1, he stated that his motivation to do this was not out of selflessness. He was more interested in obtaining a discount to the Hackito Ergo Sum 2012 conference. The discount is provided to those attendees that have disclosed CVE issues. It may be interesting to think more about providing these kind of simple incentives in the future to reduce the number of issues that are currently sat on by those without motivation to disclose.

Note that one could argue that Gu1's decision to fully disclose the issue with no advance notice to those involved was less than ideal. The delayed disclosure (often framed as "responsible disclosure") camp believes that vendors need some time to be able to do appropriate analysis and testing of fixes, and thus disclosers should give those vendors some time (though how much time is often a question). This issue demonstrates a case where that preparation time didn't matter. The issue was fully disclosed and hours later security teams had the problem solved. That is because Gu1's research was comprehensive enough to be able to isolate and fix the problem right away. This kind of detailed analysis should be sought as the norm. Whether that analysis is shared with the vendor or project before being made public typically depends on which camp (full or responsible disclosure) the researcher is in.

In terms of affected releases, X.org 1.11 was originally shipped in June 2011. Shortly thereafter, distribution development branches started picking it up. Debian unstable got it in August, Debian testing got it in September, and the Fedora 16 stable release got it in November. A final timeline of the issue demonstrates how impressively quickly the issue was resolved after disclosure by those distributions affected by it:

Date/Time (UTC) Event
01/05/2012 Gu1 discovers issue
01/19/2012 00:03 Gu1 discloses issue on blog and oss-security
01/19/2012 05:49 workaround posted
01/19/2012 10:19 X.org fixed in Debian unstable
01/19/2012 22:01 X.org fixed in Fedora 16
01/19/2012 23:48 X.org upstream fixed (actually in XKB)
01/22/2012 16:39 X.org fixed in Debian testing (delay due to testing's 2-day minimum migration policy)

For the set of distributions actually affected by this issue, their security teams reacted with admirable speed. The table below lists the time it took to release a fix after Gu1's disclosure. Note that the "underground potential" entry is the length of time that the underground side of the computer security community may have been able to exploit the problem. That said, there is no way of ever knowing if or when it was actually discovered before the disclosure. We do know at least that Gu1 knew about the issue two weeks prior to publishing it.

Distribution Vulnerability window Underground potential
Debian unstable ~10 hours ~5 months
Fedora 16 ~22 hours ~2 months
X.org upstream (XKB) ~23 hours ~6 months
Debian testing ~64 hours ~4 months

Conclusions

This particular case raises some questions about the prevailing wisdom that its always best to be running the latest and greatest software releases. Note that each new release involves some kind of code modifications with varying levels of risk. Interestingly, it turns out that in this case users were safer if they chose slower-moving releases. As seen above, the incredibly fast-moving Debian unstable release had a 4 month potential for underground abuse; whereas Debian testing, which moves a bit slower, had a smaller 3 month potential. Fedora 16 was caught by this; whereas Ubuntu wasn't since they played it a bit safer and stuck with X.org 1.10 for their 11.10 release. Distributions have to make their choices about which new releases to include based on their interest in delivering "bleeding edge" packages to their users. Sometimes that means that undiscovered security bugs come along for the ride.

By all measures Daniel and Peter have an extensive background working on X.org. Daniel has been working on various aspects (including DRM/KMS drivers, gstreamer, and kernel input drivers) for 9 years and Peter for 6 years as well (he is the input subsystem maintainer and has worked on libXi). Even with this extensive experience, X.org is such a complex system that there is always the potential for mistakes. We're all human after all. Daniel had this to say:

Oh, at this stage I don't think we can say with a straight face that we're able to create perfectly resilient and secure systems. The best we can do is admit that failures will occur, try to pre-emptively limit the damage they can do before they're found, and then make sure our procedures for dealing with problems as they're found are best-of-class. Even if all your components are extensively documented, noting their various restrictions, requirements and limitations, as well as being extensively tested, the reality is that people are human so either your implementation will be subtly broken in ways you don't expect, or one of your users will just use it wrong. Saying that we have perfect security is just hubris.

I've got a lot of time for the school of thought that argues that as complex systems are inherently less secure than simple ones, the best thing to do is to build less complex software. Understanding the flow of events between X and its myriad clients, and the effects even a simple change will have, is really not an easy thing to do. I find the setuid vs. capabilities issue that's been cropping up recently a pretty entertaining example of the law of unintended consequences.

One could argue that Wayland is the simplification needed to eliminate the complexities of X, and it's good that most distributions are now on a long-term term path toward that goal. But even so, Wayland is not necessarily going to be a magic bullet as some have argued. It too will have its share of complexity, and there is always the possibility of writing flaws into the new code, which will only be discovered given time, interest, and motivation. Computer security is always a matter of vigilance.

[ The author would like to thank Daniel Stone, Peter Hutterer, and Gu1 for taking the time to answer interview questions for this article. ]

Comments (11 posted)

Brief items

Security quotes of the week

Sure, ASLR helps, but I want a basic browser capable of running Javascript securely in a thread-safe jail without crashing on double frees, running out of memory, and selling more cookies than the Girl Scouts, that somehow manages to maintain more hidden access logs than a Swiss bank on MY personal computer, regardless of the privacy settings I choose.
-- John Doe (Thanks to Daniel Dickman.)

DARPA is funding research into new forms of biometrics that authenticate people as they use their computer: things like keystroke patterns, eye movements, mouse behavior, reading speed, and surfing and e-mail response behavior. The idea -- and I think this is a good one -- is that the computer can continuously authenticate people, and not just authenticate them once when they first start using their computers.
-- Bruce Schneier

One attack I hadn't seen before was to try a large number of usernames, and parts of the hostname as password. For a hostname of the style MACHINE.DOMAIN.DEPARTMENT.cam.ac.uk, the attack tried DOMAIN, DOMAIN.DEPARTMENT, MACHINE, then MACHINE.DOMAIN. This clearly isn't a dictionary but a bit of custom code which did a reverse DNS lookup on this host then generated some possible passwords. Using the hostname as a password for a host isn't a good idea, but I can imagine some sysadmins doing so. The fact that some attackers are taking this approach might merit some explicit statement in password selection guidance.
-- Steven J. Murdoch continues his SSH brute force research

Comments (none posted)

X.org screensaver bypass found

A debugging feature introduced into the X.org server 1.11 can be used by someone with physical access to the system to bypass the screensaver. First reported by "Gu1" on their blog and on the oss-security mailing list. The key sequence Ctrl-Alt-KeypadMultiply will bypass any screensaver. A workaround has been posted, but one would expect an update from X.org before long.

Comments (30 posted)

Linux Local Privilege Escalation via SUID /proc/pid/mem Write (zx2c4)

The "zx2c4" weblog has a detailed writeup of a local root vulnerability in /proc introduced in 2.6.39 and just fixed on January 17. "In 2.6.39, the protections against unauthorized access to /proc/pid/mem were deemed sufficient, and so the prior #ifdef that prevented write support for writing to arbitrary process memory was removed. Anyone with the correct permissions could write to process memory. It turns out, of course, that the permissions checking was done poorly. This means that all Linux kernels >=2.6.39 are vulnerable, up until the fix commit for it a couple days ago. Let’s take the old kernel code step by step and learn what’s the matter with it." As of this writing, distributors do not yet appear to have begun shipping updates for this vulnerability.

Comments (107 posted)

New vulnerabilities

bip: code execution

Package(s):bip CVE #(s):CVE-2012-0806
Created:January 25, 2012 Updated:April 9, 2013
Description: The bip IRC proxy contains a buffer overflow that may be exploitable for code execution by a remote attacker.
Alerts:
Mandriva MDVSA-2013:063 bip 2013-04-08
Mageia MGASA-2012-0265 bip 2012-09-13
Fedora FEDORA-2012-0916 bip 2012-02-04
Fedora FEDORA-2012-0941 bip 2012-02-04
Gentoo 201201-18 bip 2012-01-30
Debian DSA-2393-1 bip 2012-01-25

Comments (none posted)

bugzilla: multiple vulnerabilities

Package(s):bugzilla CVE #(s):CVE-2011-3657 CVE-2011-3667 CVE-2011-3668 CVE-2011-3669
Created:January 19, 2012 Updated:January 25, 2012
Description:

From the Red Hat bugzilla entry:

CVE-2011-3657: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to XSS.

CVE-2011-3667: The User.offer_account_by_email WebService method ignores the user_can_create_account setting of the authentication method and generates an email with a token in it which the user can use to create an account. Depending on the authentication method being active, this could allow the user to log in using this account. Installations where the createemailregexp parameter is empty are not vulnerable to this issue.

CVE-2011-3668, CVE-2011-3669: The creation of bug reports and of attachments is not protected by a token and so they can be created without the consent of a user if the relevant code is embedded in an HTML page and the user visits this page. This behavior was intentional to let third-party applications submit new bug reports and attachments easily. But as this behavior can be abused by a malicious user, it has been decided to block submissions with no valid token starting from version 4.2rc1.

Alerts:
Fedora FEDORA-2012-0301 bugzilla 2012-01-19
Fedora FEDORA-2012-0328 bugzilla 2012-01-19

Comments (none posted)

dhcp: denial of service

Package(s):dhcp CVE #(s):CVE-2011-4868
Created:January 23, 2012 Updated:January 25, 2012
Description: From the CVE entry:

The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.

Alerts:
Gentoo 201301-06 dhcp 2013-01-09
Slackware SSA:2012-237-01 dhcp 2012-08-24
Fedora FEDORA-2012-0490 dhcp 2012-01-22

Comments (none posted)

emacs: privilege escalation

Package(s):emacs CVE #(s):CVE-2012-0035
Created:January 24, 2012 Updated:January 27, 2014
Description: From the CVE entry:

Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.

Alerts:
Gentoo 201403-05 emacs 2014-03-20
Gentoo 201401-31 cedet 2014-01-27
Mandriva MDVSA-2013:076 emacs 2013-04-08
Ubuntu USN-1586-1 emacs23 2012-09-27
Mageia MGASA-2012-0261 emacs 2012-09-09
Fedora FEDORA-2012-0462 emacs 2012-01-23
Fedora FEDORA-2012-0494 emacs 2012-01-23

Comments (none posted)

glibc: denial of service

Package(s):glibc CVE #(s):CVE-2011-4609
Created:January 25, 2012 Updated:January 25, 2012
Description: The glibc remote procedure call implementation allows remote attackers to open large numbers of connections, causing the target application to use excessive amounts of CPU time.
Alerts:
Ubuntu USN-1396-1 eglibc, glibc 2012-03-09
Scientific Linux SL-glib-20120214 glibc 2012-02-14
Scientific Linux SL-glib-20120214 glibc 2012-02-14
Oracle ELSA-2012-0126 glibc 2012-02-14
Oracle ELSA-2012-0125 glibc 2012-02-14
CentOS CESA-2012:0126 glibc 2012-02-14
CentOS CESA-2012:0125 glibc 2012-02-14
Red Hat RHSA-2012:0125-01 glibc 2012-02-13
Red Hat RHSA-2012:0126-01 glibc 2012-02-13
CentOS CESA-2012:0058 glibc 2012-01-30
Scientific Linux SL-glib-20120125 glibc 2012-01-25
Red Hat RHSA-2012:0058-01 glibc 2012-01-24

Comments (none posted)

kernel: denial of service

Package(s):linux CVE #(s):CVE-2012-0044
Created:January 24, 2012 Updated:February 7, 2012
Description: From the Ubuntu advisory:

Chen Haogang discovered an integer overflow that could result in memory corruption. A local unprivileged user could use this to crash the system.

Alerts:
openSUSE openSUSE-SU-2012:1439-1 kernel 2012-11-05
Ubuntu USN-1556-1 linux-ec2 2012-09-06
Ubuntu USN-1555-1 linux 2012-09-05
openSUSE openSUSE-SU-2012:0799-1 kernel 2012-06-28
Red Hat RHSA-2012:1042-01 kernel 2012-06-26
Oracle ELSA-2012-0743 kernel 2012-06-21
Ubuntu USN-1394-1 Linux kernel (OMAP4) 2012-03-07
Ubuntu USN-1387-1 linux-lts-backport-maverick 2012-03-06
Ubuntu USN-1386-1 linux-lts-backport-natty 2012-03-06
Red Hat RHSA-2012:0333-01 kernel-rt 2012-02-23
Ubuntu USN-1362-1 linux 2012-02-13
Ubuntu USN-1361-1 linux 2012-02-13
Scientific Linux SL-kern-20120619 kernel 2012-06-19
CentOS CESA-2012:0743 kernel 2012-06-19
Red Hat RHSA-2012:0743-01 kernel 2012-06-18
Ubuntu USN-1356-1 linux-ti-omap4 2012-02-07
Ubuntu USN-1340-1 linux-lts-backport-oneiric 2012-01-23

Comments (none posted)

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2012-0056
Created:January 23, 2012 Updated:January 30, 2012
Description: Jüri Aedla discovered that the kernel incorrectly handled /proc/<pid>/mem permissions. A local attacker could exploit this and gain root privileges.

See the "zx2c4" weblog and this LWN article for additional details.

Alerts:
Oracle ELSA-2013-1645 kernel 2013-11-26
openSUSE openSUSE-SU-2013:0927-1 kernel 2013-06-10
Oracle ELSA-2012-0862 kernel 2012-07-02
Ubuntu USN-1364-1 linux-ti-omap4 2012-02-13
Ubuntu USN-1342-1 linux-lts-backport-oneiric 2012-01-25
Scientific Linux SL-kern-20120125 kernel 2012-01-25
Oracle ELSA-2012-2001 kernel-uek 2012-01-25
Oracle ELSA-2012-2001 kernel-uek 2012-01-25
Oracle ELSA-2012-0052 kernel 2012-01-25
Red Hat RHSA-2012:0061-01 kernel-rt 2012-01-24
Fedora FEDORA-2012-0861 kernel 2012-01-24
CentOS CESA-2012:0052 kernel 2012-01-24
Fedora FEDORA-2012-0876 kernel 2012-01-24
Red Hat RHSA-2012:0052-01 kernel 2012-01-23
Ubuntu USN-1336-1 linux 2012-01-23

Comments (6 posted)

krb5: denial of service

Package(s):mit-krb5 CVE #(s):CVE-2011-0283 CVE-2011-4151
Created:January 24, 2012 Updated:January 25, 2012
Description: From the CVE entries:

The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed request packet that does not trigger a response packet. (CVE-2011-0283)

The krb5_db2_lockout_audit function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4, when the db2 (aka Berkeley DB) back end is used, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors, a different vulnerability than CVE-2011-1528. (CVE-2011-4151)

Alerts:
Gentoo 201201-13 mit-krb5 2012-01-23

Comments (none posted)

logsurfer: arbitrary code execution

Package(s):logsurfer CVE #(s):CVE-2011-3626
Created:January 23, 2012 Updated:January 25, 2012
Description: From the Gentoo advisory:

Logsurfer log files may contain substrings used for executing external commands. The prepare_exec() function in src/exec.c contains a double-free vulnerability.

A remote attacker could inject specially-crafted strings into a log file processed by Logsurfer, resulting in the execution of arbitrary code with the permissions of the Logsurfer user.

Alerts:
Gentoo 201201-04 logsurfer 2012-01-20

Comments (none posted)

nxserver-freeedition: privilege escalation

Package(s):nxserver-freeedition CVE #(s):CVE-2011-3977
Created:January 23, 2012 Updated:January 25, 2012
Description: From the Gentoo advisory:

NX Server Free Edition and NX Node use nxconfigure.sh, a setuid script containing an unspecified vulnerability.

A local attacker could gain escalated privileges.

Alerts:
Gentoo 201201-07 nxserver-freeedition 2012-01-23

Comments (none posted)

openssl: denial of service

Package(s):openssl CVE #(s):CVE-2012-0050
Created:January 23, 2012 Updated:February 17, 2012
Description: From the CVE entry:

OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service via unspecified vectors. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108.

Alerts:
openSUSE openSUSE-SU-2013:0336-1 openssl 2013-02-25
SUSE SUSE-SU-2012:0674-1 openssl 2012-05-30
Gentoo 201203-12 openssl 2012-03-05
openSUSE openSUSE-SU-2012:0266-1 openssl 2012-02-17
Ubuntu USN-1357-1 openssl 2012-02-09
Mandriva MDVSA-2012:011 openssl 2012-01-29
Oracle ELSA-2012-0059 openssl 2012-01-25
Oracle ELSA-2012-0060 openssl 2012-01-25
Fedora FEDORA-2012-0702 openssl 2012-01-24
Debian DSA-2392-1 openssl 2012-01-23
Fedora FEDORA-2012-0708 openssl 2012-01-22

Comments (none posted)

phpmyadmin: cross-site scripting

Package(s):phpmyadmin CVE #(s):CVE-2011-1940
Created:January 23, 2012 Updated:January 25, 2012
Description: From the Debian advisory:

Cross site scripting was possible in the table tracking feature, allowing a remote attacker to inject arbitrary web script or HTML.

Alerts:
Debian DSA-2391-1 phpmyadmin 2012-01-22

Comments (none posted)

qemu-kvm: code execution

Package(s):qemu-kvm CVE #(s):CVE-2012-0029
Created:January 24, 2012 Updated:August 20, 2012
Description: From the Ubuntu advisory:

Nicolae Mogoreanu discovered that QEMU did not properly verify legacy mode packets in the e1000 network driver. A remote attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program.

Alerts:
Gentoo 201210-04 qemu-kvm 2012-10-18
SUSE SUSE-SU-2012:1320-1 qemu 2012-10-09
Mageia MGASA-2012-0222 qemu 2012-08-18
Fedora FEDORA-2012-8592 qemu 2012-06-07
Fedora FEDORA-2012-8604 qemu 2012-06-07
openSUSE openSUSE-SU-2012:0548-1 xen 2012-04-23
Scientific Linux SL-xen-20120321 xen 2012-03-21
openSUSE openSUSE-SU-2012:0347-1 Xen 2012-03-09
Oracle ELSA-2012-0370 xen 2012-03-08
Oracle ELSA-2012-0149 kvm 2012-03-07
Red Hat RHSA-2012:0370-01 xen 2012-03-07
Fedora FEDORA-2012-1539 xen 2012-02-19
Fedora FEDORA-2012-1375 xen 2012-02-19
openSUSE openSUSE-SU-2012:0267-1 qemu-kvm 2012-02-17
openSUSE openSUSE-SU-2012:0207-1 kvm 2012-02-09
Debian DSA-2404-1 xen-qemu-dm-4.0 2012-02-05
Debian DSA-2396-1 qemu-kvm 2012-01-27
Scientific Linux SL-qemu-20120125 qemu-kvm 2012-01-25
CentOS CESA-2012:0051 kvm 2012-01-24
Scientific Linux SL-kvm-20120124 kvm 2012-01-24
CentOS CESA-2012:0050 qemu-kvm 2012-01-24
Oracle ELSA-2012-0051 kvm 2012-01-23
Oracle ELSA-2012-0050 qemu-kvm 2012-01-23
Red Hat RHSA-2012:0051-01 kvm 2012-01-23
Red Hat RHSA-2012:0050-01 qemu-kvm 2012-01-23
Ubuntu USN-1339-1 qemu-kvm 2012-01-23

Comments (none posted)

rsyslog: denial of service

Package(s):rsyslog CVE #(s):CVE-2011-4623
Created:January 24, 2012 Updated:July 10, 2012
Description: From the Ubuntu advisory:

Peter Eisentraut discovered that Rsyslog would not properly perform input validation when configured to use imfile. If an attacker were able to craft messages in a file that Rsyslog monitored, an attacker could cause a denial of service. The imfile module is disabled by default in Ubuntu.

Alerts:
Gentoo 201412-35 rsyslog 2014-12-24
CentOS CESA-2012:0796 rsyslog 2012-07-10
Scientific Linux SL-rsys-20120709 rsyslog 2012-07-09
Oracle ELSA-2012-0796 rsyslog 2012-07-02
Mandriva MDVSA-2012:100 rsyslog 2012-06-25
Red Hat RHSA-2012:0796-04 rsyslog 2012-06-20
Ubuntu USN-1338-1 rsyslog 2012-01-23

Comments (none posted)

tomcat: denial of service via hash collision

Package(s):tomcat CVE #(s):CVE-2011-4858
Created:January 19, 2012 Updated:February 2, 2012
Description:

From the Novell CVE entry:

Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.

Alerts:
Mageia MGASA-2012-0189 tomcat6 2012-08-02
Gentoo 201206-24 tomcat 2012-06-24
Oracle ELSA-2012-0474 tomcat5 2012-04-12
Scientific Linux SL-tomc-20120411 tomcat6 2012-04-11
Scientific Linux SL-tomc-20120411 tomcat5 2012-04-11
CentOS CESA-2012:0475 tomcat6 2012-04-11
CentOS CESA-2012:0474 tomcat5 2012-04-11
Red Hat RHSA-2012:0475-01 tomcat6 2012-04-11
Red Hat RHSA-2012:0474-01 tomcat5 2012-04-11
Ubuntu USN-1359-1 tomcat6 2012-02-13
Debian DSA-2401-1 tomcat6 2012-02-02
openSUSE openSUSE-SU-2012:0103-1 tomcat 2012-01-19

Comments (none posted)

torque: impersonation vulnerability

Package(s):torque CVE #(s):
Created:January 23, 2012 Updated:January 25, 2012
Description: Torque allows one user to impersonate another within a batch system. Fixed in version 3.0.3.
Alerts:
Fedora FEDORA-2012-0372 torque 2012-01-21

Comments (none posted)

wireshark: multiple vulnerabilities

Package(s):wireshark CVE #(s):CVE-2012-0041 CVE-2012-0042 CVE-2012-0043
Created:January 23, 2012 Updated:January 27, 2012
Description: From the Red Hat bugzilla [1], [2], [3]:

Laurent Butti discovered that Wireshark failed to properly check record sizes for many packet capture file formats. It may be possible to make Wireshark crash by convincing someone to read a malformed packet trace file. This is corrected in upstream 1.4.11 and 1.6.5.

Wireshark was improperly handling NULL pointers when displaying packet information which could lead to a crash. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. This is corrected in upstream 1.4.11 and 1.6.5.

The RLC dissector could overflow a buffer. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. This is corrected in upstream 1.4.11 and 1.6.5.

Alerts:
Oracle ELSA-2013-1569 wireshark 2013-11-26
Gentoo GLSA 201308-05:02 wireshark 2013-08-30
Gentoo 201308-05 wireshark 2013-08-28
Oracle ELSA-2013-0125 wireshark 2013-01-12
Scientific Linux SL-wire-20130116 wireshark 2013-01-16
CentOS CESA-2012:0509 wireshark 2012-04-24
Oracle ELSA-2012-0509 wireshark 2012-04-23
Scientific Linux SL-wire-20120423 wireshark 2012-04-23
Red Hat RHSA-2012:0509-01 wireshark 2012-04-23
openSUSE openSUSE-SU-2012:0295-1 wireshark 2012-02-23
Debian DSA-2395-1 wireshark 2012-01-27
Fedora FEDORA-2012-0440 wireshark 2012-01-24
Fedora FEDORA-2012-0435 wireshark 2012-01-22

Comments (none posted)

xkeyboard-config: screensaver lock bypass

Package(s):xkeyboard-config CVE #(s):CVE-2012-0064
Created:January 20, 2012 Updated:January 30, 2012
Description: From the Red Hat bugzilla:

It was found that XKB actions for debugging X.org clients were enabled by default. This could cause a screen locking application such as gnome-screensaver to be killed when those key combinations were triggered.

Alerts:
Gentoo 201201-16 xkeyboard-config 2012-01-27
Fedora FEDORA-2012-0709 xkeyboard-config 2012-01-24
Fedora FEDORA-2012-0712 xkeyboard-config 2012-01-19

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2012, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds