|
|
Subscribe / Log in / New account

Security

Integrity and embedded devices

By Jake Edge
October 2, 2013

Linux Security Summit

David Safford's talk for the 2013 Linux Security Summit was in two parts—with two separate sets of slides. That's because the US Department of Homeland Security (DHS), which sponsored IBM's work on hardware roots of trust for embedded devices—part one of the talk—was quite clear that it didn't want to be associated with any kind of device cracking. So part two, which concerned circumventing "verified boot" on a Samsung ARM Chromebook, had to be a completely separate talk. The DHS's misgivings notwithstanding, the two topics are clearly related; understanding both leads to a clearer picture of the security of our devices.

The DHS is interested in what can be done to verify the integrity of the code that is running on all types of systems. For servers, desktops, and mobile devices, there are a variety of existing solutions: crypto hardware, secure boot, Trusted Platform Module (TPM) hardware, and so on. But for low-cost embedded devices like home routers, there is no support for integrity checking. The DHS is also interested in integrity checking for even lower cost sensors, Safford said, but those don't run Linux so they weren't part of his investigations.

Because routers and the like are such low-cost and low-margin systems, the researchers focused on what could be done for "zero cost" to the manufacturer. The team looked at four devices: the venerable Linksys WRT54G router (which spawned projects like OpenWrt and DD-WRT), the Pogoplug local network attached storage (NAS) cache, and two other router devices, the TP-Link MR3020 and D-Link DIR-505. All of those typically retail for around $50.

The MR3020, which was the focus for much of the talk, retails for $30. It has very limited space in its 4M flash chip, so the challenge to adding integrity features is "not so much technical" as it is in "squeezing things in" to the flash. For example, the MR3020 only has 64K of space for U-Boot, 1M for the kernel, and 2.8M for the root filesystem.

Safford gave a handful of examples of router vulnerabilities over the last few years. Beyond just theoretical examples, he noted that 4.5 million home routers were actually compromised in Brazil in 2011. While the vulnerabilities he listed were at the higher levels (typically the web interface), they do show that these embedded devices are most certainly targets.

So, without increasing the cost of these devices, what can be done to ensure that the firmware is what it is expected to be? In the supply chain, the wrong firmware could be added when the system is built or changed somewhere along the way. Safford said that IBM had some (unnamed) customers who had run into just this kind of problem.

So there needs to be a way to "measure" the firmware's integrity in hardware and then to lock the firmware down so that rootkits or other malware cannot modify it. In addition, these devices typically do not have support for signed updates, so malicious update files can be distributed and installed. There is also no ability for the system to refuse to boot if the code has been changed (i.e. secure or trusted boot).

Providing those capabilities was the goal for the project, he said. He showed a table (also present in his slides [PDF] and associated paper [PDF]) outlining the abilities of each of the devices in four separate integrity categories: "Measure BIOS?", "Lock BIOS?", "Secure local updates?", and "Secure Boot?". All of the boxes were "No", except that both the Pogoplug and WRT54G had a way to measure—verify—the firmware (by reading it using SATA via an immutable boot ROM and JTAG, respectively). By the end of the talk, those boxes had all been changed to "Yes" by the changes Safford and his team had made.

The traditional approaches for integrity revolve around either attestation (e.g. trusted boot) or a trusted chain of signed code as in UEFI secure boot. Attestation means that a system uses a TPM to measure everything read and executed, then sends that information to a trusted system for verification before being allowed to continue. There are several National Institute of Standards and Technology (NIST) standards that govern parts of the integrity puzzle, including trusted boot, but there are none, at least yet, that govern secure boot. Safford is working with NIST to get that process started.

Since a TPM chip is "expensive" ($0.75), it violates the zero-cost constraint. But in order to verify the firmware, it must be read somehow. The firmware itself cannot be involved in that step as it may lie about its contents to avoid malware detection. The Serial Peripheral Interface (SPI) bus provides a mechanism to read the contents of the flash for devices lacking other means (e.g. JTAG). That bus can be shared if it has proper buffering, but both the MR3020 and DIR-505 lack the resistors needed.

[Bus Pirate on MR3020]

Enter the Bus Pirate—a device that can be used to read the SPI bus. Using it requires adding three buffering resistors to the Atheros System-on-Chip (SoC) used by the devices, but that adds less than $0.01 to the cost of the device, which is close enough to zero cost that device makers can probably be convinced. That means that users (or device makers) can verify the contents of the flash fairly inexpensively (a Bus Pirate costs around $30).

Once the contents of the flash are verified, there needs to be a way to lock it down so that it can only be modified by those verified to be physically present. The SPI flash chips used by all of the devices have a status register that governs which addresses in the flash can be written, along with an overall write-disable bit. That register can be locked from any updates by holding the chip's write-protect (!WP) pin low. Physical presence can be proved by holding down a button at boot to drive !WP high.

Safford showed the modifications made to the MR3020 and DIR-505 to support the physical presence test. The WPS (Wireless Protected Setup) button was repurposed on the MR3020, while an unused sliding switch position was used on the DIR-505. The paper indicates that similar changes were made on the other two devices. Both the slides and paper have pictures of the modifications made to the devices. In addition, U-Boot was modified so that it locks the entire flash on each boot, but if !WP is held high when power is applied, U-Boot will unlock the flash.

Adding secure boot support to U-Boot was the next step. Once the root of trust is extended into the kernel, the kernel's integrity subsystem can take over to handle integrity verification from there. So it is a matter of verifying the kernel itself. The modified U-Boot will use a public key that is stored at the end of its partition to verify the signature of the kernel. That signature is stored at the end of the kernel partition.

As mentioned earlier, the trick is in getting that code (and key) to fit into the 64K U-Boot partition. Using code derived from PolarSSL, with everything unneeded removed, the modified U-Boot weighed in at 62K. Though Safford was never very specific, the U-Boot modifications must also provide RSA signature checking for updates to the firmware. Support for signed updates is one of the integrity requirements that were successfully tackled by the project.

Through some effectively zero-cost modifications, and some changes to the firmware, the team was able to achieve its integrity goals. All of the devices now support all four of the integrity requirements they set out to fulfill.

Breaking verified boot

Moving on to the DHS-unapproved portion of the talk, Safford showed how one can take control of a Samsung ARM Chromebook. The work on that was done in his spare time, he said, but many of the tools used for adding secure boot for embedded devices are the same as those for removing and altering a system with secure boot. The Chromebook is a "very secure" system, but the verified boot (VB) mechanism does not allow users to take control of the boot process.

However, a fairly simple hardware modification (removing a washer to change the !WP signal) will allow the owner to take control of the device, as Safford found. Beyond the hardware change, it also requires some scripts and instructions [tar.gz] that Safford wrote. Unlike the embedded devices described above, there is a full 4M flash just for U-Boot on the Chromebook, so there is "an embarrassment of riches" for adding code on those systems. VB has been added to the U-Boot upstream code, incidentally, but it is way too large (700K) for use in routers, he said.

In the normal VB operation, there is no way to write to the upper half of the SPI flash, which contains a copy of U-Boot and Google's root key. That key is used to verify two keys (firmware and kernel) stored in the read-write half of the SPI flash. The firmware key is used to verify another copy of U-Boot that lives in the modifiable portion of the flash. That U-Boot is responsible for verifying the kernel (which actually lives in a separate MMC flash) before booting it.

Holding down ESC and "refresh" while powering on the system will boot whatever kernel is installed, without checking the signatures. That is the "developer mode" for the system, but it circumvents secure boot, which is not what Safford set out to do. He wants to use secure boot but control the keys himself. In addition, developer mode must be enabled each time the system boots and you get a "scary screen" that says "OS verification is OFF".

A less scary approach is to use a non-verifying U-Boot that gets installed in place of the kernel. That U-Boot is signed, but does no verification of the kernel (installed in a different part of the MMC flash) before booting it. That way you don't have to invoke developer mode, nor do you get the scary screen, but you still don't get secure boot.

[ARM Chromebook washer]

Removing the washer is the way forward as it allows read-write access to the entire SPI flash. Once that is done, Safford has a set of scripts that can be run from a developer-mode kernel to create new key pairs, sign the read-write U-Boot, sign the kernel, and verify all of the signatures. If any of that goes wrong, one may end up at the "Chrome OS is missing or damaged" screen, which actually means the device hasn't been "bricked" and can be restored from a USB device. Even in the event of bricking, one can recover the device using Bus Pirate as the SPI flash is properly buffered, he said (seemingly from a fair amount of experience).

As part of his demo, he wanted an easy way to show that he had gained control of the low-level boot code in the SPI flash. He decided to change the "chrome" text in the upper left of the "scary screen" to "DaveOS", which actually turned out to be one of the harder ways to demonstrate it. Because of the format of the logo and where it was stored in the flash, it turned out to be rather painful to change, he said with a chuckle.

As Kees Cook pointed out, the washer removal trick was a deliberate choice in the design of the system. Google and Samsung wanted people to be able to take control of the keys for the device, but didn't want an attacker to be able to do so quickly while the user's attention was momentarily distracted. Safford agreed that it was a reasonable compromise, but that it is important for users to be able to set their own keys.

The slides [PDF] for the second half of the talk are instructive as well, with a number of pictures of the infamous washer, scary and DaveOS screens, the Bus Pirate in action, and so on. Seeing the problem from both angles, adding and subtracting secure boot functionality, was useful to help better understand integrity verification. Techniques like secure boot certainly can be used in user-unfriendly ways to lock down devices, but it can also provide some amount of peace of mind. As long as users can provide their own keys—or disable the feature entirely—secure boot is likely be a boon for many.

[I would like to thank LWN subscribers for travel assistance to New Orleans for LSS.]

Comments (8 posted)

Brief items

Security quotes of the week

Now think it through. If Verisign is owned by the NSA, and a Russian CA is owned by FSB, and a Chinese CA is owned by that government, and all three of these compromised CAs agree on a cert, what does it mean?

It means the cert is probably accurate, or about as accurate as you can possibly get, without going over to the server certing it yourself. If those three parties are conspiring to disrupt your Amazon order, then I'm afraid you're not going to get your package, no matter what crypto you use. :-)

— Slashdot user Sloppy (Thanks to Zenaan Harkness.)

The public now has to think about the fact that anybody in public life, or person in a position of influence in government, business or bureaucracy, now is thinking about what the NSA knows about them. So how can we trust that the decisions that they make are objective and that they aren't changing the decisions that they make to protect their career? That strikes at any system of representative government.
— Former Microsoft privacy adviser Caspar Bowden (Thanks to Michael Kerrisk.)

Comments (10 posted)

New vulnerabilities

chicken: code execution

Package(s):chicken CVE #(s):CVE-2013-4385
Created:September 30, 2013 Updated:February 10, 2014
Description: From the Red Hat bugzilla:

Chicken, a compiler for the Scheme programming language, is found to have a buffer overrrun flaw due to the read-string! procedure from the "extras" unit, when used in a particular way.

It was found that there was a missing check for the situation when NUM was at #f (the scheme value for false) in the buffer as the buffer size, then it will read beyond the buffer until the input port is exhausted. This may result in a DoS or a remote code execution.

Though currently all stable releases are vulnerable to this flaw, there is a simple workaround to be used in code that uses read-string!: simply convert all (read-string! #f buf ...) invocations to (read-string! (string-length buf) buf ...) or, if possible, use the non-destructive read-string procedure from the same unit.

Alerts:
Gentoo 201612-54 chicken 2016-12-31
Fedora FEDORA-2013-22130 chicken 2014-02-09
Fedora FEDORA-2013-17912 chicken 2013-11-26
Fedora FEDORA-2013-17868 chicken 2013-09-30

Comments (none posted)

davfs2: privilege escalation

Package(s):davfs2 CVE #(s):CVE-2013-4362
Created:September 27, 2013 Updated:December 2, 2016
Description:

From the Debian advisory:

Davfs2, a filesystem client for WebDAV, calls the function system() insecurely while is setuid root. This might allow a privilege escalation.

Alerts:
Gentoo 201612-02 davfs2 2016-12-02
Debian DSA-2765-2 davfs2 2014-07-16
Fedora FEDORA-2013-17836 davfs2 2013-12-19
Fedora FEDORA-2013-17853 davfs2 2013-12-19
Mageia MGASA-2013-0304 davfs2 2013-10-11
Mandriva MDVSA-2013:244 davfs2 2013-09-30
Debian DSA-2765-1 davfs2 2013-09-26

Comments (none posted)

firefox: denial of service

Package(s):firefox CVE #(s):CVE-2013-1723
Created:September 27, 2013 Updated:October 2, 2013
Description:

From the CVE entry:

The NativeKey widget in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 processes key messages after destruction by a dispatched event listener, which allows remote attackers to cause a denial of service (application crash) by leveraging incorrect event usage after widget-memory reallocation.

Alerts:
openSUSE openSUSE-SU-2014:1100-1 Firefox 2014-09-09
Mageia MGASA-2013-0329 iceape 2013-11-20
openSUSE openSUSE-SU-2013:1499-1 Mozilla 2013-09-29
Gentoo 201309-23 firefox 2013-09-27
openSUSE openSUSE-SU-2013:1495-1 thunderbird 2013-09-27
openSUSE openSUSE-SU-2013:1491-1 seamonkey 2013-09-27
openSUSE openSUSE-SU-2013:1493-1 firefox 2013-09-27

Comments (none posted)

glibc: multiple vulnerabilities

Package(s):glibc CVE #(s):CVE-2013-4788 CVE-2013-4332
Created:September 30, 2013 Updated:October 11, 2013
Description: From the OpenWall advisories [1; 2]:

I recently discovered three integer overflow issues in the glibc memory allocator functions pvalloc, valloc and posix_memalign/memalign/aligned_alloc. These issues cause a large allocation size to wrap around and cause a wrong sized allocation and heap corruption. (CVE-2013-4332)

This bug was discovered in March 2013 while we were developing the RAF SSP technique. The glibc bug makes it easy to take advantage of common errors such as buffer overflows allows in these cases redirect the execution flow and potentially execute arbitrary code.

All statically linked applications compiled with glibc and eglibc are affected, independent of the operating system distribution. Note that this problem is not solved by only patching the eglibc, but it is also necessary to recompile all static executables. As far I know there are a lot of routers, embedded systems etc., which use static linked applications. Since the bug is from the beginning of the PTR_MANGLE implementations (years 2005-2006) there are a ton of vulnerable devices. (CVE-2013-4788)

Alerts:
Debian-LTS DLA-165-1 eglibc 2015-03-06
Gentoo 201503-04 glibc 2015-03-08
SUSE SUSE-SU-2014:1128-1 glibc 2014-09-15
SUSE SUSE-SU-2014:1122-1 glibc 2014-09-12
Scientific Linux SLSA-2013:1605-2 glibc 2013-12-03
Mageia MGASA-2013-0340 glibc 2013-11-22
Oracle ELSA-2013-1605 glibc 2013-11-26
Mandriva MDVSA-2013:284 glibc 2013-11-25
Mandriva MDVSA-2013:283 glibc 2013-11-25
Red Hat RHSA-2013:1605-02 glibc 2013-11-21
Ubuntu USN-1991-1 eglibc 2013-10-21
Scientific Linux SLSA-2013:1411-1 glibc 2013-10-10
Oracle ELSA-2013-1411 glibc 2013-10-09
Red Hat RHSA-2013:1411-01 glibc 2013-10-08
openSUSE openSUSE-SU-2013:1510-1 glibc 2013-09-30
Fedora FEDORA-2013-17475 glibc 2013-09-28

Comments (1 posted)

gpg2: information disclosure

Package(s):gpg2 CVE #(s):CVE-2013-4351
Created:September 27, 2013 Updated:November 13, 2013
Description:

From the openSUSE bug report:

RFC 4880 permits OpenPGP keyholders to mark their primary keys and subkeys with a "key flags" packet that indicates the capabilities of the key [0]. These are represented as a set of binary flags, including things like "This key may be used to encrypt communications."

If a key or subkey has this "key flags" subpacket attached with all bits cleared (off), GnuPG currently treats the key as having all bits set (on). While keys with this sort of marker are very rare in the wild, GnuPG's misinterpretation of this subpacket could lead to a breach of confidentiality or a mistaken identity verification.

Alerts:
Gentoo 201402-24 gnupg 2014-02-21
Fedora FEDORA-2013-18647 gnupg 2013-11-13
Scientific Linux SLSA-2013:1459-1 gnupg2 2013-10-24
Scientific Linux SLSA-2013:1458-1 gnupg 2013-10-24
Oracle ELSA-2013-1459 gnupg2 2013-10-24
Oracle ELSA-2013-1459 gnupg2 2013-10-24
Oracle ELSA-2013-1458 gnupg 2013-10-24
CentOS CESA-2013:1459 gnupg2 2013-10-25
CentOS CESA-2013:1459 gnupg2 2013-10-24
CentOS CESA-2013:1458 gnupg 2013-10-25
Red Hat RHSA-2013:1459-01 gnupg2 2013-10-24
Red Hat RHSA-2013:1458-01 gnupg 2013-10-24
Fedora FEDORA-2013-18676 gnupg 2013-10-12
Debian DSA-2774-1 gnupg2 2013-10-10
Debian DSA-2773-1 gnupg 2013-10-10
Ubuntu USN-1987-1 gnupg, gnupg2 2013-10-09
Mandriva MDVSA-2013:247 gnupg 2013-10-10
Mageia MGASA-2013-0299 gnupg2 2013-10-10
openSUSE openSUSE-SU-2013:1532-1 gpg2 2013-10-08
openSUSE openSUSE-SU-2013:1526-1 gpg2 2013-10-06
openSUSE openSUSE-SU-2013:1494-1 gpg2 2013-09-27

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2013-4205
Created:September 27, 2013 Updated:October 2, 2013
Description:

From the Ubuntu advisory:

A memory leak was discovered in the user namespace facility of the Linux kernel. A local user could cause a denial of service (memory consumption) via the CLONE_NEWUSER unshare call.

Alerts:
Ubuntu USN-1971-1 linux-lts-raring 2013-09-27
Ubuntu USN-1974-1 kernel 2013-09-27

Comments (none posted)

kernel: information leak

Package(s):linux-2.6 CVE #(s):CVE-2013-2239
Created:September 30, 2013 Updated:October 2, 2013
Description: From the Debian advisory:

Jonathan Salwan discovered multiple memory leaks in the openvz kernel flavor. Local users could gain access to sensitive kernel memory.

Alerts:
Debian DSA-2766-1 linux-2.6 2013-09-27

Comments (none posted)

kernel: off by one error

Package(s):kernel CVE #(s):CVE-2013-4345
Created:October 1, 2013 Updated:October 23, 2013
Description: From the Red Hat bugzilla:

A flaw was found in the way ansi cprng implementation in the Linux kernel processed non-block size aligned requests. If several small requests are made that are less than the instances block size, the remainder for loop code doesn't increment rand_data_valid in the last iteration, meaning that the last bytes in the rand_data buffer gets reused on the subsequent smaller-than-a-block request for random data.

Alerts:
openSUSE openSUSE-SU-2014:0766-1 Evergreen 2014-06-06
Debian DSA-2906-1 linux-2.6 2014-04-24
Ubuntu USN-2158-1 linux-lts-raring 2014-03-31
Ubuntu USN-2110-1 linux-ti-omap4 2014-02-18
Ubuntu USN-2109-1 kernel 2014-02-18
Ubuntu USN-2074-1 linux-ti-omap4 2014-01-03
Ubuntu USN-2076-1 linux-ti-omap4 2014-01-03
Ubuntu USN-2072-1 linux-ti-omap4 2014-01-03
Ubuntu USN-2070-1 linux-lts-saucy 2014-01-03
Ubuntu USN-2068-1 linux-lts-quantal 2014-01-03
Ubuntu USN-2071-1 kernel 2014-01-03
Ubuntu USN-2075-1 kernel 2014-01-03
Ubuntu USN-2064-1 kernel 2014-01-03
Ubuntu USN-2065-1 EC2 kernel 2014-01-03
Oracle ELSA-2014-3002 kernel 2014-02-12
Scientific Linux SLSA-2013:1645-2 kernel 2013-12-16
Oracle ELSA-2013-2584 kernel 2013-11-28
Oracle ELSA-2013-2584 kernel 2013-11-28
Oracle ELSA-2013-2585 kernel 2013-11-28
Oracle ELSA-2013-2585 kernel 2013-11-28
Oracle ELSA-2013-2583 kernel 2013-11-28
Red Hat RHSA-2013:1645-02 kernel 2013-11-21
Red Hat RHSA-2013:1490-01 kernel-rt 2013-10-31
Oracle ELSA-2013-1645 kernel 2013-11-26
Scientific Linux SLSA-2013:1449-1 kernel 2013-10-23
Oracle ELSA-2013-1449 kernel 2013-10-23
CentOS CESA-2013:1449 kernel 2013-10-23
Red Hat RHSA-2013:1449-01 kernel 2013-10-22
Fedora FEDORA-2013-17942 kernel 2013-10-03
Fedora FEDORA-2013-17865 kernel 2013-10-01

Comments (none posted)

monkeyd: multiple vulnerabilities

Package(s):monkeyd CVE #(s):CVE-2013-2163 CVE-2013-3724 CVE-2013-3843
Created:September 26, 2013 Updated:October 2, 2013
Description:

From the CVE entry:

The mk_request_header_process function in mk_request.c in Monkey 1.1.1 allows remote attackers to cause a denial of service (thread crash and service outage) via a '\0' character in an HTTP request. (CVE-2013-3724)

From the Gentoo bug report:

The vulnerability is caused due to a signedness error in the "mk_request_header_process()" function (src/mk_request.c) when parsing the request and can be exploited to cause a stack-based buffer overflow. (CVE-2013-3843)

From the monkeyd bug report:

The ranges parser did not validate properly the maximum offset allowed, so if a requester set limit offset equal to file size it continue processing, internally the sendfile(2) did not failed returning always zero, this condition was not handled and for hence that connections keeps running without ending, it could lead to a DoS. (CVE-2013-2163)

Alerts:
Gentoo 201309-17 monkeyd 2013-09-25

Comments (none posted)

mozilla: privilege escalation

Package(s):firefox, thunderbird, seamonkey CVE #(s):CVE-2013-1726
Created:September 30, 2013 Updated:October 2, 2013
Description: From the CVE entry:

Mozilla Updater in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 does not ensure exclusive access to a MAR file, which allows local users to gain privileges by creating a Trojan horse file after MAR signature verification but before MAR use.

Alerts:
SUSE SUSE-SU-2013:1497-1 firefox 2013-09-27
Gentoo 201309-23 firefox 2013-09-27

Comments (none posted)

MRG Grid: denial of service

Package(s):MRG Grid CVE #(s):CVE-2013-4284
Created:October 2, 2013 Updated:October 2, 2013
Description: From the Red Hat advisory:

A denial of service flaw was found in the way cumin, a web management console for MRG, processed certain Ajax update queries. A remote attacker could use this flaw to issue a specially crafted HTTP request, causing excessive use of CPU time and memory on the system.

Alerts:
Red Hat RHSA-2013:1295-01 MRG Grid 2013-10-01
Red Hat RHSA-2013:1294-01 MRG Grid 2013-10-01

Comments (none posted)

nas: multiple vulnerabilities

Package(s):nas CVE #(s):CVE-2013-4256 CVE-2013-4257 CVE-2013-4258
Created:September 27, 2013 Updated:June 26, 2014
Description:

From the Fedora advisory:

CVE-2013-4258 (formatting string for syslog call)

CVE-2013-4256 (parsing display number)

CVE-2013-4257 (heap overflow when processing AUDIOHOST variable)

Alerts:
Gentoo 201406-22 nas 2014-06-26
Mageia MGASA-2013-0298 nas 2013-10-10
Debian DSA-2771-1 nas 2013-10-09
Ubuntu USN-1986-1 nas 2013-10-01
Fedora FEDORA-2013-16989 nas 2013-09-27
Fedora FEDORA-2013-17036 nas 2013-09-27

Comments (none posted)

openstack-keystone: incorrect token revocation

Package(s):openstack-keystone CVE #(s):CVE-2013-4294
Created:September 26, 2013 Updated:November 8, 2013
Description:

From the Red Hat advisory:

It was found that Keystone did not correctly handle revoked PKI tokens, allowing users with revoked tokens to retain access to resources they should no longer be able to access. This issue only affected systems using PKI tokens with the memcache or KVS token back ends.

Alerts:
Fedora FEDORA-2013-20373 openstack-keystone 2013-11-08
Ubuntu USN-2002-1 keystone 2013-10-23
Red Hat RHSA-2013:1285-01 openstack-keystone 2013-09-25

Comments (none posted)

squid: information disclosure

Package(s):squid CVE #(s):CVE-2009-0801
Created:September 27, 2013 Updated:October 2, 2013
Description:

From the CVE entry:

Squid, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.

Alerts:
Scientific Linux SLSA-2016:1140-1 squid34 2016-06-16
Scientific Linux SLSA-2016:1139-1 squid 2016-06-07
CentOS CESA-2016:1140 squid34 2016-05-31
CentOS CESA-2016:1139 squid 2016-05-31
Red Hat RHSA-2016:1140-01 squid34 2016-05-31
Red Hat RHSA-2016:1139-01 squid 2016-05-31
Gentoo 201309-22 squid 2013-09-27

Comments (none posted)

sudo: privilege escalation

Package(s):sudo CVE #(s):CVE-2013-2776
Created:October 1, 2013 Updated:October 2, 2013
Description: From the CVE entry:

sudo 1.3.5 through 1.7.10p5 and 1.8.0 through 1.8.6p6, when running on systems without /proc or the sysctl function with the tty_tickets option enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to a standard input, output, and error file descriptors of another terminal. NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.

Alerts:
Gentoo 201401-23 sudo 2014-01-21
Scientific Linux SLSA-2013:1701-2 sudo 2013-12-09
Oracle ELSA-2013-1701 sudo 2013-11-26
Red Hat RHSA-2013:1701-02 sudo 2013-11-21
Scientific Linux SLSA-2013:1353-1 sudo 2013-10-10
Oracle ELSA-2013-1353 sudo 2013-10-02
Red Hat RHSA-2013:1353-01 sudo 2013-09-30

Comments (none posted)

tpp: code execution

Package(s):tpp CVE #(s):CVE-2013-2208
Created:September 26, 2013 Updated:February 12, 2014
Description:

From the Gentoo advisory:

TPP templates may contain a --exec clause, the contents of which are automatically executed without confirmation from the user.

A remote attacker could entice a user to open a specially crafted file using TPP, possibly resulting in execution of arbitrary code with the privileges of the user.

Alerts:
Fedora FEDORA-2014-1955 tpp 2014-02-11
Fedora FEDORA-2014-1935 tpp 2014-02-11
Gentoo 201309-19 tpp 2013-09-25

Comments (none posted)

txt2man: file overwrite

Package(s):txt2man CVE #(s):CVE-2013-1444
Created:October 1, 2013 Updated:October 2, 2013
Description: From the CVE entry:

A certain Debian patch for txt2man 1.5.5, as used in txt2man 1.5.5-2, 1.5.5-4, and others, allows local users to overwrite arbitrary files via a symlink attack on /tmp/2222.

Alerts:
Ubuntu USN-1979-1 txt2man 2013-09-30

Comments (none posted)

vino: denial of service

Package(s):vino CVE #(s):CVE-2013-5745
Created:October 1, 2013 Updated:November 7, 2013
Description: From the Ubuntu advisory:

Jonathan Claudius discovered that Vino incorrectly handled closing invalid connections. A remote attacker could use this issue to cause Vino to consume resources, resulting in a denial of service.

Alerts:
SUSE SUSE-SU-2013:1631-2 vino 2013-11-06
SUSE SUSE-SU-2013:1631-1 vino 2013-11-06
Fedora FEDORA-2013-17121 vino 2013-10-25
Scientific Linux SLSA-2013:1452-1 vino 2013-10-23
Oracle ELSA-2013-1452 vino 2013-10-22
Oracle ELSA-2013-1452 vino 2013-10-22
CentOS CESA-2013:1452 vino 2013-10-23
CentOS CESA-2013:1452 vino 2013-10-23
Red Hat RHSA-2013:1452-01 vino 2013-10-22
Mageia MGASA-2013-0300 vino 2013-10-10
Ubuntu USN-1980-1 vino 2013-09-30

Comments (none posted)

zabbix: man-in-the-middle attacks

Package(s):zabbix CVE #(s):CVE-2012-6086
Created:September 30, 2013 Updated:October 15, 2013
Description: From the Red Hat bugzilla:

A security flaw was found in the way Zabbix, an open-source monitoring solution for IT infrastructure, used (lib)cURL's CURLOPT_SSL_VERIFYHOST variable, when doing certificate validation (value of '1' meaning only check for the existence of a common name was used instead of value '2' - which also checks if the particular common name matches the requested hostname of the server). A rogue service could use this flaw to conduct man-in-the-middle (MiTM) attacks.

Alerts:
Fedora FEDORA-2014-5551 zabbix 2014-05-01
Fedora FEDORA-2013-18351 zabbix 2013-10-14
Fedora FEDORA-2013-18348 zabbix 2013-10-14
Fedora FEDORA-2013-14029 zabbix 2013-09-30

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds