|
|
Subscribe / Log in / New account

Security

"Strong" stack protection for GCC

By Jake Edge
February 5, 2014

Stack buffer overflows are a longstanding problem for C programs that leads to all manner of ills, many of which are security vulnerabilities. The biggest problems have typically been with string buffers on the stack coupled with bad or missing length tests. A programmer who mistakenly leaves open the possibility of overrunning a buffer on a function's stack may be allowing attackers to overwrite the return pointer pushed onto the stack earlier. Since the attackers may be able to control what gets written, they can control where the function returns—with potentially dire results. GCC, like many compilers, offers features to help detect buffer overflows; the upcoming 4.9 release offers a new stack-protection mode with a different tradeoff between security and performance impact.

GCC has supported stack protection for some time. It currently supports two different types of stack protection. Recently, Google engineers have come up with another style that tries to chart a middle course between the two existing options. It has made its way into GCC 4.9 (expected later this year) and the upcoming 3.14 kernel has support for building with that option.

The basic idea behind stack protection is to push a "canary" (a randomly chosen integer) on the stack just after the function return pointer has been pushed. The canary value is then checked before the function returns; if it has changed, the program will abort. Generally, stack buffer overflow (aka "stack smashing") attacks will have to change the value of the canary as they write beyond the end of the buffer before they can get to the return pointer. Since the value of the canary is unknown to the attacker, it cannot be replaced by the attack. Thus, the stack protection allows the program to abort when that happens rather than return to wherever the attacker wanted it to go.

There is a downside to using canaries. The value must be generated and checked, which takes some time, but more importantly there must be code added to handle the canary for each function that is protected that way. That extra code results in some level of performance degradation, perhaps mostly due to a larger cache footprint. For this reason, it can make sense to restrict stack protection to a subset of all the functions in a program.

So the question has always been: "Which functions should be protected?" Putting stack protection into every function is both overkill and may hurt performance, so one of the GCC options chooses a subset of functions to protect. The existing -fstack-protector-all option will protect all functions, while the -fstack-protector option chooses any function that declares a character array of eight bytes or more in length on its stack. Some distributions have lowered that threshold (e.g. to four) in their builds by using the --param=ssp-buffer-size=N option.

That "character array" test catches the most "at risk" functions, but it leaves a number of other functions behind. As Kees Cook pointed out in a recent blog post, the Google Chrome OS team had been using -fstack-protector-all since the team is "paranoid", but a new -fstack-protector-strong option has been developed to broaden the scope of the stack protection without extending it to every function in the program.

In addition to the protections offered by -fstack-protector, the new option will guard any function that declares any type or length of local array, even those in structs or unions. It will also protect functions that use a local variable's address in a function argument or on the right-hand side of an assignment. In addition, any function that uses local register variables will be protected. According to Cook, Chrome OS has been using -fstack-protector-strong (instead of protecting all functions) for ten months or so.

During the 3.14 merge window, Linus Torvalds pulled Cook's patches to add the ability to build the kernel using the strong stack protection. In Ingo Molnar's pull request (and Cook's post), the results of using strong protection on the kernel were presented. The kernel with -fstack-protector turned on is 0.33% larger and covers 2.81% of the functions in the kernel. For -fstack-protector-strong, those numbers are an increase of 2.4% in code size over an unprotected kernel, but 20.5% of the functions are covered.

The CONFIG_CC_STACKPROTECTOR_STRONG kernel configuration option adds the strong protection, while the CONFIG_CC_STACKPROTECTOR option for the "regular" protection has been renamed to reflect that: CONFIG_CC_STACKPROTECTOR_REGULAR. The default CONFIG_CC_STACKPROTECTOR_NONE does just what its name would imply.

While stack protection certainly isn't a panacea for security woes, it will catch a significant portion of real-world attacks. Having an option that strikes a balance between the ultra-paranoid "all" and the regular variant (not to mention the wide-open "none" option) is likely to catch more bugs—and attack vectors. We will likely see some of the more security-conscious distributions building their user-space programs and kernels with the "strong" option moving forward.

Comments (33 posted)

Brief items

Security quotes of the week

Bad guys have the time, skills, and motivation to study edge devices for weaknesses, and they are finding as many weaknesses as they need to inject malicious code into our precious devices where they can then copy our data, modify our installed software, spy on us, and steal our identities—75 years of science fiction has not begun to prepare us for how vulnerable we and our livelihoods are, now that everyone is online. Since the adversaries of freedom and privacy now include nation-states, the extreme vulnerability of edge devices and their software is a fresh new universal human-rights problem for the whole world.
Paul Vixie

The male túngara frog Physalaemus pustulosus uses calls to attract females. But croaking also causes ripples in the water, which are eavesdropped on -- both by rival male frogs and frog-eating bats.
Bruce Schneier notes a side-channel attack in nature

Comments (1 posted)

OpenSSH 6.5 released

The "feature-focused" OpenSSH 6.5 release is available. Changes include new ciphers and key types, a new private key format, and more. "Add support for key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein's Curve25519. This key exchange method is the default when both the client and server support it."

Full Story (comments: 11)

New vulnerabilities

bind: denial of service

Package(s):bind CVE #(s):CVE-2013-3919
Created:January 30, 2014 Updated:February 5, 2014
Description:

From the CVE entry:

resolver.c in ISC BIND 9.8.5 before 9.8.5-P1, 9.9.3 before 9.9.3-P1, and 9.6-ESV-R9 before 9.6-ESV-R9-P1, when a recursive resolver is configured, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a record in a malformed zone.

Alerts:
Gentoo 201401-34 bind 2014-01-29

Comments (none posted)

curl: information disclosure

Package(s):curl CVE #(s):CVE-2014-0015
Created:January 31, 2014 Updated:February 24, 2014
Description:

From the Debian advisory:

Paras Sethia discovered that libcurl, a client-side URL transfer library, would sometimes mix up multiple HTTP and HTTPS connections with NTLM authentication to the same server, sending requests for one user over the connection authenticated as a different user.

Alerts:
Arch Linux ASA-201504-28 curl 2015-04-24
Mandriva MDVSA-2015:098 curl 2015-03-28
Scientific Linux SLSA-2014:0561-1 curl 2014-05-27
Oracle ELSA-2014-0561 curl 2014-05-27
CentOS CESA-2014:0561 curl 2014-05-28
Red Hat RHSA-2014:0561-01 curl 2014-05-27
Mandriva MDVSA-2014:110 curl 2014-06-10
Mageia MGASA-2014-0153 curl 2014-04-03
openSUSE openSUSE-SU-2014:0274-1 curl 2014-02-21
openSUSE openSUSE-SU-2014:0267-1 curl 2014-02-21
Ubuntu USN-2097-1 curl 2014-02-03
Debian DSA-2849-1 curl 2014-01-31
Fedora FEDORA-2014-1864 curl 2014-02-15
Slackware SSA:2014-044-01 curl 2014-02-13
Fedora FEDORA-2014-1876 curl 2014-02-03

Comments (none posted)

flite: insecure temporary files

Package(s):flite CVE #(s):CVE-2014-0027
Created:February 5, 2014 Updated:February 17, 2014
Description: From the CVE entry:

The play_wave_from_socket function in audio/auserver.c in Flite 1.4 allows local users to modify arbitrary files via a symlink attack on /tmp/awb.wav. NOTE: some of these details are obtained from third party information.

Alerts:
Mageia MGASA-2014-0047 flite 2014-02-10
Fedora FEDORA-2014-0574 flite 2014-02-05
Mandriva MDVSA-2014:032 flite 2014-02-14
Fedora FEDORA-2014-0579 flite 2014-02-05

Comments (none posted)

horde3: code execution

Package(s):horde3 CVE #(s):CVE-2014-1691
Created:February 5, 2014 Updated:February 5, 2014
Description: From the Debian advisory:

Pedro Ribeiro from Agile Information Security found a possible remote code execution on Horde3, a web application framework. Unsanitized variables are passed to the unserialize() PHP function. A remote attacker could specially-crafted one of those variables allowing her to load and execute code.

Alerts:
Debian DSA-2853-1 horde3 2014-02-05

Comments (none posted)

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2014-0038
Created:January 31, 2014 Updated:February 20, 2014
Description:

From the Ubuntu advisory:

Pageexec reported a bug in the Linux kernel's recvmsg syscall when called from code using the x32 ABI. An unprivileged local user could exploit this flaw to cause a denial of service (system crash) or gain administrator privileges.

Alerts:
Slackware SSA:2014-050-03 kernel 2014-02-19
Ubuntu USN-2095-1 linux-lts-saucy 2014-01-30
Ubuntu USN-2094-1 linux-lts-raring 2014-01-30
Ubuntu USN-2096-1 kernel 2014-01-30
Mageia MGASA-2014-0063 kernel-rt 2014-02-12
openSUSE openSUSE-SU-2014:0205-1 kernel 2014-02-06
Mageia MGASA-2014-0061 kernel-linus 2014-02-12
Mageia MGASA-2014-0045 kernel-tmb 2014-02-10
Mageia MGASA-2014-0039 kernel 2014-02-08
Mandriva MDVSA-2014:038 kernel 2014-02-17
Mageia MGASA-2014-0064 kernel-vserver 2014-02-12
Mageia MGASA-2014-0055 kernel-vserver 2014-02-11
CentOS CESA-2014:X005 kernel 2014-02-12
Mageia MGASA-2014-0046 kernel-tmb 2014-02-10
Mageia MGASA-2014-0044 kernel-rt 2014-02-10
Mageia MGASA-2014-0043 kernel-linus 2014-02-10
Mageia MGASA-2014-0038 kernel 2014-02-08
openSUSE openSUSE-SU-2014:0204-1 kernel 2014-02-06

Comments (none posted)

libmicrohttpd: denial of service

Package(s):libmicrohttpd CVE #(s):CVE-2013-7038
Created:January 31, 2014 Updated:February 5, 2014
Description:

From the Mageia alert:

The MHD_http_unescape function in libmicrohttpd before 0.9.32 might allow remote attackers to obtain sensitive information or cause a denial of service (crash) via unspecified vectors that trigger an out-of-bounds read.

Alerts:
Mageia MGASA-2014-0030 libmicrohttpd 2014-01-31
Gentoo 201402-01 libmicrohttpd 2014-02-02

Comments (none posted)

libotr: information disclosure

Package(s):libotr CVE #(s):
Created:January 31, 2014 Updated:February 5, 2014
Description:

From the Debian bug report:

It's been known [1] since 2006 that clients supporting both OTRv1 and v2 (such as libotr 3.x) are subject to protocol downgrade attacks clients. It's also been known for a while that OTRv1 has serious security issues (that were the main reason for a v2, actually). In short, support v2 only is the only safe way to go these days.

Alerts:
Ubuntu USN-2091-1 libotr 2014-01-30

Comments (none posted)

libvirt: multiple vulnerabilities

Package(s):libvirt CVE #(s):CVE-2013-6457 CVE-2014-0028
Created:January 31, 2014 Updated:February 5, 2014
Description:

From the Ubuntu advisory:

Dario Faggioli discovered that libvirt incorrectly handled the libxl driver. A local user could possibly use this flaw to cause libvirtd to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 13.10. (CVE-2013-6457)

Eric Blake discovered that libvirt incorrectly handled certain ACLs. An attacker could use this flaw to possibly obtain certain sensitive information. This issue only affected Ubuntu 13.10. (CVE-2014-0028)

Alerts:
Gentoo 201412-04 libvirt 2014-12-09
openSUSE openSUSE-SU-2014:0268-1 libvirt 2014-02-21
Ubuntu USN-2093-1 libvirt 2014-01-30

Comments (none posted)

libyaml: code execution

Package(s):libyaml CVE #(s):CVE-2013-6393
Created:February 3, 2014 Updated:April 7, 2014
Description: From the Debian advisory:

Florian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially-crafted tag that, when parsed by an application using libyaml, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

Alerts:
openSUSE openSUSE-SU-2016:1067-1 perl-YAML-LibYAML 2016-04-17
Mandriva MDVSA-2015:060 yaml 2015-03-13
openSUSE openSUSE-SU-2015:0319-1 perl-YAML-LibYAML 2015-02-18
CentOS CESA-2014:0355 ruby193-libyaml 2014-05-21
Red Hat RHSA-2014:0415-01 libyaml 2014-04-17
Mandriva MDVSA-2014:070 yaml 2014-04-09
Mandriva MDVSA-2014:069 perl-YAML-LibYAML 2014-04-09
Fedora FEDORA-2014-4517 perl-YAML-LibYAML 2014-04-07
Fedora FEDORA-2014-4548 perl-YAML-LibYAML 2014-04-07
Red Hat RHSA-2014:0364-01 ruby193-libyaml 2014-04-03
Mageia MGASA-2014-0154 perl-YAML-LibYAML 2014-04-03
Red Hat RHSA-2014:0355-01 ruby193-libyaml 2014-04-02
Red Hat RHSA-2014:0353-01 libyaml 2014-04-02
Red Hat RHSA-2014:0354-01 libyaml 2014-04-02
openSUSE openSUSE-SU-2014:0381-1 libyaml 2014-03-17
Gentoo 201403-02 libyaml 2014-03-08
Debian DSA-2870-1 libyaml-libyaml-perl 2014-03-08
Ubuntu USN-2161-1 libyaml-libyaml-perl 2014-04-03
openSUSE openSUSE-SU-2014:0273-1 libyaml 2014-02-21
openSUSE openSUSE-SU-2014:0272-1 libyaml 2014-02-21
Ubuntu USN-2098-2 libyaml 2014-02-13
Debian DSA-2850-2 libyaml 2014-02-12
Fedora FEDORA-2014-1851 libyaml 2014-02-08
Fedora FEDORA-2014-1817 libyaml 2014-02-08
Mandriva MDVSA-2014:034 yaml 2014-02-14
Mageia MGASA-2014-0040 yaml 2014-02-08
Ubuntu USN-2098-1 libyaml 2014-02-04
Debian DSA-2850-1 libyaml 2014-01-31

Comments (none posted)

moodle: multiple vulnerabilities

Package(s):moodle CVE #(s):CVE-2014-0008 CVE-2014-0009 CVE-2014-0010
Created:January 31, 2014 Updated:February 12, 2014
Description:

From the Red Hat Bugzilla:

Andrew Steele found that some password changes were visible in plain text to Administrators in the config changes report. This issue affected Moodle versions 2.6, 2.5 to 2.5.4, 2.4 to 2.4.7 and earlier unsupported versions. It has been fixed in versions 2.6.1, 2.5.4 and 2.4.8. (CVE-2014-0008)

Itamar Tzadok found an issue in the group constraint checking for loginas. In some cases if a user had loginas privileges but not the site:accessallgroups capability, they could use this flaw to log in as a user not in their group. This issue affected Moodle versions 2.6, 2.5 to 2.5.4, 2.4 to 2.4.7, 2.3 to 2.3.10 and earlier unsupported versions. It has been fixed in 2.6.1, 2.5.4, 2.4.8 and 2.3.11. (CVE-2014-0009)

Jun Zhu found that some profile fields were vulnerable to Cross-Site Request Forgery (CSRF). An attacker could use these flaws to perform actions on profiles (such as deleting categories). These issues affected Moodle versions 2.6, 2.5 to 2.5.4, 2.4 to 2.4.7, 2.3 to 2.3.10 and earlier unsupported versions. It has been fixed in 2.6.1, 2.5.4, 2.4.8 and 2.3.11. (CVE-2014-0010)

Alerts:
Fedora FEDORA-2014-10802 moodle 2014-09-25
Fedora FEDORA-2014-1396 moodle 2014-01-31
Fedora FEDORA-2014-1377 moodle 2014-01-31
Mageia MGASA-2014-0053 moodle 2014-02-11

Comments (none posted)

mozilla: multiple vulnerabilities

Package(s):firefox, thunderbird, seamonkey CVE #(s):CVE-2014-1477 CVE-2014-1479 CVE-2014-1481 CVE-2014-1482 CVE-2014-1486 CVE-2014-1487
Created:February 5, 2014 Updated:February 24, 2014
Description: From the Red Hat advisory:

Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2014-1477, CVE-2014-1482, CVE-2014-1486)

A flaw was found in the way Firefox handled error messages related to web workers. An attacker could use this flaw to bypass the same-origin policy, which could lead to cross-site scripting (XSS) attacks, or could potentially be used to gather authentication tokens and other data from third-party websites. (CVE-2014-1487)

A flaw was found in the implementation of System Only Wrappers (SOW). An attacker could use this flaw to crash Firefox. When combined with other vulnerabilities, this flaw could have additional security implications. (CVE-2014-1479)

It was found that the Firefox JavaScript engine incorrectly handled window objects. A remote attacker could use this flaw to bypass certain security checks and possibly execute arbitrary code. (CVE-2014-1481)

Alerts:
Gentoo 201504-01 firefox 2015-04-07
openSUSE openSUSE-SU-2014:1100-1 Firefox 2014-09-09
openSUSE openSUSE-SU-2014:0419-1 Mozilla 2014-03-21
Fedora FEDORA-2014-2324 seamonkey 2014-02-22
Fedora FEDORA-2014-2291 seamonkey 2014-02-22
Ubuntu USN-2102-2 firefox 2014-02-19
Ubuntu USN-2119-1 thunderbird 2014-02-19
SUSE SUSE-SU-2014:0248-2 firefox 2014-02-19
SUSE SUSE-SU-2014:0248-1 firefox 2014-02-18
CentOS CESA-2014:0132 firefox 2014-02-05
Fedora FEDORA-2014-2051 firefox 2014-02-12
Ubuntu USN-2102-1 firefox 2014-02-10
Mageia MGASA-2014-0048 seamonkey 2014-02-10
Slackware SSA:2014-039-02 thunderbird 2014-02-08
Debian DSA-2858-1 iceweasel 2014-02-10
Oracle ELSA-2014-0132 firefox 2014-02-05
Fedora FEDORA-2014-2040 xulrunner 2014-02-06
Oracle ELSA-2014-0132 firefox 2014-02-04
CentOS CESA-2014:0132 firefox 2014-02-05
Slackware SSA:2014-039-01 firefox 2014-02-08
openSUSE openSUSE-SU-2014:0212-1 firefox 2014-02-08
Mageia MGASA-2014-0036 mozilla 2014-02-06
Scientific Linux SLSA-2014:0133-1 thunderbird 2014-02-05
Scientific Linux SLSA-2014:0132-1 firefox 2014-02-05
CentOS CESA-2014:0133 thunderbird 2014-02-05
CentOS CESA-2014:0133 thunderbird 2014-02-05
Red Hat RHSA-2014:0133-01 thunderbird 2014-02-04
Red Hat RHSA-2014:0132-01 firefox 2014-02-04
Fedora FEDORA-2014-2051 xulrunner 2014-02-12
Slackware SSA:2014-039-03 seamonkey 2014-02-08
openSUSE openSUSE-SU-2014:0213-1 Mozilla 2014-02-08
Fedora FEDORA-2014-2041 thunderbird 2014-02-07
Fedora FEDORA-2014-2040 firefox 2014-02-06
Oracle ELSA-2014-0133 thunderbird 2014-02-04

Comments (none posted)

mumble: multiple vulnerabilities

Package(s):mumble CVE #(s):CVE-2014-0044 CVE-2014-0045
Created:February 5, 2014 Updated:May 8, 2014
Description: From the Debian advisory:

CVE-2014-0044: It was discovered that a malformed Opus voice packet sent to a Mumble client could trigger a NULL pointer dereference or an out-of-bounds array access. A malicious remote attacker could exploit this flaw to mount a denial of service attack against a mumble client by causing the application to crash.

CVE-2014-0045: It was discovered that a malformed Opus voice packet sent to a Mumble client could trigger a heap-based buffer overflow. A malicious remote attacker could use this flaw to cause a client crash (denial of service) or potentially use it to execute arbitrary code.

Alerts:
Gentoo 201406-06 mumble 2014-06-06
Fedora FEDORA-2014-5751 mumble 2014-05-08
Fedora FEDORA-2014-5767 mumble 2014-05-08
openSUSE openSUSE-SU-2014:0271-1 mumble 2014-02-21
Debian DSA-2854-1 mumble 2014-02-05

Comments (none posted)

openldap: denial of service

Package(s):openldap CVE #(s):CVE-2013-4449
Created:February 4, 2014 Updated:March 11, 2014
Description: From the Red Hat advisory:

A denial of service flaw was found in the way the OpenLDAP server daemon (slapd) performed reference counting when using the rwm (rewrite/remap) overlay. A remote attacker able to query the OpenLDAP server could use this flaw to crash the server by immediately unbinding from the server after sending a search request.

Alerts:
Ubuntu USN-2622-1 openldap 2015-05-26
Debian-LTS DLA-203-1 openldap 2015-04-18
Debian DSA-3209-1 openldap 2015-03-30
Fedora FEDORA-2014-2967 openldap 2014-03-11
Scientific Linux SLSA-2014:0206-1 openldap 2014-02-24
Oracle ELSA-2014-0206 openldap 2014-02-24
CentOS CESA-2014:0206 openldap 2014-02-24
Red Hat RHSA-2014:0206-01 openldap 2014-02-24
Red Hat RHSA-2014:0126-01 openldap 2014-02-03
Scientific Linux SLSA-2014:0126-1 openldap 2014-02-03
Mageia MGASA-2014-0062 openldap 2014-02-12
Fedora FEDORA-2014-2012 openldap 2014-02-11
CentOS CESA-2014:0126 openldap 2014-02-04
Mandriva MDVSA-2014:026 openldap 2014-02-12
Oracle ELSA-2014-0126 openldap 2014-02-03

Comments (none posted)

openstack-nova: information leak

Package(s):openstack-nova CVE #(s):CVE-2013-7130
Created:February 5, 2014 Updated:February 5, 2014
Description: From the Red Hat bugzilla:

Loganathan Parthipan from Hewlett Packard reported a vulnerability in the Nova libvirt driver. By spawning a server with the same flavor as another user's migrated virtual machine, an authenticated user can potentially access that user's snapshot content resulting in information leakage. Only setups using KVM live block migration are affected.

Alerts:
Ubuntu USN-2247-1 nova 2014-06-17
Red Hat RHSA-2014:0366-01 openstack-nova 2014-04-03
Red Hat RHSA-2014:0231-01 openstack-nova 2014-03-04
Fedora FEDORA-2014-1463 openstack-nova 2014-02-05
Fedora FEDORA-2014-1516 openstack-nova 2014-02-05

Comments (none posted)

openstack-nova: information disclosure

Package(s):openstack-nova CVE #(s):CVE-2013-6491
Created:January 31, 2014 Updated:May 7, 2014
Description:

From the Red hat advisory:

It was discovered that enabling "qpid_protocol = ssl" in the nova.conf file did not result in nova using SSL to communicate to Qpid. If Qpid was not configured to enforce SSL this could lead to sensitive information being sent unencrypted over the communication channel.

Alerts:
Ubuntu USN-2247-1 nova 2014-06-17
Ubuntu USN-2208-2 quantum 2014-05-06
Ubuntu USN-2208-1 cinder 2014-05-06
Red Hat RHSA-2014:0112-01 openstack-nova 2014-01-30

Comments (none posted)

perl-MARC-XML: information disclosure

Package(s):perl-MARC-XML CVE #(s):CVE-2014-1626
Created:January 31, 2014 Updated:February 5, 2014
Description:

From the CVE entry:

XML External Entity (XXE) vulnerability in MARC::File::XML module before 1.0.2 for Perl, as used in Evergreen, Koha, perl4lib, and possibly other products, allows context-dependent attackers to read arbitrary files via a crafted XML file.

Alerts:
Fedora FEDORA-2014-1326 perl-MARC-XML 2014-01-31
Fedora FEDORA-2014-1341 perl-MARC-XML 2014-01-31

Comments (none posted)

pidgin: multiple vulnerabilities

Package(s):pidgin CVE #(s):CVE-2012-6152 CVE-2013-6477 CVE-2013-6478 CVE-2013-6479 CVE-2013-6481 CVE-2013-6482 CVE-2013-6483 CVE-2013-6484 CVE-2013-6485 CVE-2013-6486 CVE-2013-6487 CVE-2013-6489 CVE-2013-6490 CVE-2014-0020
Created:February 4, 2014 Updated:June 2, 2014
Description: From the Mageia advisory:

Many places in the Yahoo! protocol plugin assumed incoming strings were UTF-8 and failed to transcode from non-UTF-8 encodings. This can lead to a crash when receiving strings that aren't UTF-8 (CVE-2012-6152).

A remote XMPP user can trigger a crash on some systems by sending a message with a timestamp in the distant future (CVE-2013-6477).

libX11 forcefully exits causing a crash when Pidgin tries to create an exceptionally wide tooltip window when hovering the pointer over a long URL (CVE-2013-6478).

A malicious server or man-in-the-middle could send a malformed HTTP response that could lead to a crash (CVE-2013-6479).

The Yahoo! protocol plugin failed to validate a length field before trying to read from a buffer, which could result in reading past the end of the buffer which could cause a crash when reading a P2P message (CVE-2013-6481).

NULL pointer dereferences in the MSN protocol plugin due to a malformed Content-Length header, or a malicious server or man-in-the-middle sending a specially crafted OIM data XML response or SOAP response (CVE-2013-6482).

The XMPP protocol plugin failed to ensure that iq replies came from the person they were sent to. A remote user could send a spoofed iq reply and attempt to guess the iq id. This could allow an attacker to inject fake data or trigger a null pointer dereference (CVE-2013-6483).

Incorrect error handling when reading the response from a STUN server could lead to a crash (CVE-2013-6484).

A malicious server or man-in-the-middle could cause a buffer overflow by sending a malformed HTTP response with chunked Transfer-Encoding with invalid chunk sizes (CVE-2013-6485).

A malicious server or man-in-the-middle could send a large value for Content-Length and cause an integer overflow which could lead to a buffer overflow in Gadu-Gadu HTTP parsing (CVE-2013-6487).

A specially crafted emoticon value could cause an integer overflow which could lead to a buffer overflow in MXit emoticon parsing (CVE-2013-6489).

A Content-Length of -1 could lead to a buffer overflow in SIMPLE header parsing (CVE-2013-6490).

A malicious server or man-in-the-middle could trigger a crash in IRC argument parsing in libpurple by sending a message with fewer than expected arguments (CVE-2014-0020).

Alerts:
Gentoo 201508-02 libgadu 2015-08-15
openSUSE openSUSE-SU-2014:0742-1 libgadu 2014-06-02
openSUSE openSUSE-SU-2014:0722-1 libgadu 2014-05-28
Gentoo 201405-22 pidgin 2014-05-18
Debian DSA-2859-2 pidgin 2014-03-19
openSUSE openSUSE-SU-2014:0326-1 pidgin 2014-03-05
Fedora FEDORA-2014-2341 libgadu 2014-02-22
Mageia MGASA-2014-0074 libgadu 2014-02-16
Ubuntu USN-2101-1 libgadu 2014-02-10
Debian DSA-2852-1 libgadu 2014-02-06
Scientific Linux SLSA-2014:0139-1 pidgin 2014-02-05
Fedora FEDORA-2014-2013 pidgin 2014-02-06
CentOS CESA-2014:0139 pidgin 2014-02-05
Slackware SSA:2014-034-01 pidgin 2014-02-03
openSUSE openSUSE-SU-2014:0239-1 pidgin, 2014-02-15
Fedora FEDORA-2014-2391 libgadu 2014-02-14
Ubuntu USN-2100-1 pidgin 2014-02-06
Oracle ELSA-2014-0139 pidgin 2014-02-05
Red Hat RHSA-2014:0139-01 pidgin 2014-02-05
Mageia MGASA-2014-0034 pidgin 2014-02-05
Mandriva MDVSA-2014:039 libgadu 2014-02-18
Fedora FEDORA-2014-1999 pidgin 2014-02-14
Mandriva MDVSA-2014:025 pidgin 2014-02-11
Debian DSA-2859-1 pidgin 2014-02-10
CentOS CESA-2014:0139 pidgin 2014-02-05

Comments (none posted)

qemu: denial of service

Package(s):qemu, qemu-kvm CVE #(s):CVE-2013-4377
Created:January 31, 2014 Updated:February 13, 2014
Description:

From the Ubuntu advisory:

Sibiao Luo discovered that QEMU incorrectly handled device hot-unplugging. A local user could possibly use this flaw to cause a denial of service. This issue only affected Ubuntu 13.10.

Alerts:
Mandriva MDVSA-2015:061 qemu 2015-03-13
Ubuntu USN-2092-1 qemu, qemu-kvm 2014-01-30
Mageia MGASA-2014-0060 qemu 2014-02-12

Comments (none posted)

tntnet: information leak

Package(s):tntnet CVE #(s):CVE-2013-7299
Created:February 5, 2014 Updated:February 17, 2014
Description: From the CVE entry:

framework/common/messageheaderparser.cpp in Tntnet before 2.2.1 allows remote attackers to obtain sensitive information via a header that ends in \n instead of \r\n, which prevents a null terminator from being added and causes Tntnet to include headers from other requests.

Alerts:
Fedora FEDORA-2014-1619 tntnet 2014-02-05
Mageia MGASA-2014-0072 tntnet 2014-02-16

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2014, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds