Security
Brief items
A weak cryptoloop implementation in Linux?
The "cryptoloop" code in the Linux kernel allows "loopback" mounts of filesystems. Essentially, cryptoloop looks like a block driver which encrypts data on its way through. It can thus be used to add encryption to any of the standard Linux filesystems without changing the filesystem code itself.Recently, in response to a bug report with the 2.6.1-mm3 cryptoloop implementation, Jari Ruusu made a disturbing claim:
It will come as no surprise that this message was followed by requests for more details on the "back-doored" cryptoloop. Jari obliged with a clear, technical explanation of what is going on. If you are using (or considering) cryptoloop. it is worth a look, even if there may be no need for immediate panic.
The problem, it seems, is that cryptoloop is susceptible to a certain kind of known plaintext attack. For any given filesystem type, the contents of certain sectors will be easy to predict. Given some time and an idle processor, an attacker can generate an exhaustive dictionary of likely passwords and the resulting ciphertext that will appear on disk. With access to the actual, encrypted disk, a quick lookup in the dictionary will yield the password and enable decryption of the entire filesystem. This attack is not practical for casual snoopers, but it would not be entirely surprising if government agencies and other, relatively organized groups had this sort of dictionary handy.
There are two ways of getting around this sort of problem. One is to choose a lengthy, non-obvious password. The other is to use salted passwords, where the password is modified by a randomly-chosen value before the data is encrypted. The salt value has to be retrievable, but it has the effect of requiring an attacker to create a separate dictionary for every possible number. If the range of salt values is large enough, salting the password will render the dictionary attack impractical.
The end result is that most cryptoloop users need not go into an immediate panic, but this weakness is worth being aware of. It would also be a good idea to get a stronger mechanism into the mainline kernel. There is little to be gained and much to be lost by shipping crypto code with known weaknesses.
IBM and SUSE get EAL3+ certification
IBM and SUSE have sent out an announcement stating that SUSE LINUX Enterprise Server 8 ("with service pack 3"), when running on IBM eServer systems, has been awarded Common Criteria EAL3+ certification. This certification is a step beyond the EAL2 level reached last year. SUSE's distribution, once again, becomes the first to achieve this level of security certification.
New vulnerabilities
kdepim: VCF file information reader vulnerability
Package(s): | kdepim | CVE #(s): | CAN-2003-0988 | ||||||||||||||||||||||||||||
Created: | January 15, 2004 | Updated: | May 26, 2004 | ||||||||||||||||||||||||||||
Description: | KDE has issued a security advisory for all versions of kdepim as distributed with KDE versions 3.1.0 through 3.1.4 inclusive. A carefully crafted .VCF file potentially enables local attackers to compromise the privacy of a victim's data or execute arbitrary commands with the victim's privileges. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0988 to this issue. | ||||||||||||||||||||||||||||||
Alerts: |
|
kernel: privilege vulnerability on AMD64
Package(s): | kernel | CVE #(s): | CAN-2004-0001 | ||||||||
Created: | January 16, 2004 | Updated: | February 17, 2004 | ||||||||
Description: | On AMD64 systems, a fix was made to the eflags checking in 32-bit ptrace emulation that could have allowed local users to elevate their privileges. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0001 to this issue. | ||||||||||
Alerts: |
|
mc: arbitrary code execution
Package(s): | mc | CVE #(s): | CAN-2003-1023 | ||||||||||||||||||||||||||||||||||||||||
Created: | January 16, 2004 | Updated: | April 5, 2004 | ||||||||||||||||||||||||||||||||||||||||
Description: | A vulnerability was discovered in Midnight Commander, a file manager, whereby a malicious archive (such as a .tar file) could cause arbitrary code to be executed if opened by Midnight Commander. | ||||||||||||||||||||||||||||||||||||||||||
Alerts: |
|
netpbm: insecure temporary files
Package(s): | netpbm | CVE #(s): | CAN-2003-0924 | ||||||||||||||||||||||||||||||||||||
Created: | January 19, 2004 | Updated: | December 29, 2004 | ||||||||||||||||||||||||||||||||||||
Description: | netpbm is graphics conversion toolkit made up of a large number of single-purpose programs. Many of these programs were found to create temporary files in an insecure manner, which could allow a local attacker to overwrite files with the privileges of the user invoking a vulnerable netpbm tool. | ||||||||||||||||||||||||||||||||||||||
Alerts: |
|
qmail: integer overflow
Package(s): | qmail | CVE #(s): | |
Created: | January 21, 2004 | Updated: | January 21, 2004 |
Description: | The qmail-smtpd server suffers from an integer overflow which may be exploited to crash (one instance of) the server process. It is not clear, at this point, whether the overflow may be exploited for more useful ends; the claims made in this advisory regarding overwriting of memory have been disputed. A patch has been posted which fixes the problem. | ||
Alerts: | (No alerts in the database for this vulnerability) |
slocate: buffer overflow
Package(s): | slocate | CVE #(s): | CAN-2003-0848 | ||||||||||||||||||||||||||||||||
Created: | January 20, 2004 | Updated: | February 16, 2004 | ||||||||||||||||||||||||||||||||
Description: | A vulnerability was discovered in slocate, a program to index and search for files, whereby a specially crafted database could overflow a heap-based buffer. This vulnerability could be exploited by a local attacker to gain the privileges of the "slocate" group, which can access the global database containing a list of pathnames of all files on the system, including those which should only be visible to privileged users. This problem, and a category of potential similar problems, can be fixed by modifying slocate to drop privileges before reading a user-supplied database. | ||||||||||||||||||||||||||||||||||
Alerts: |
|
tcpdump: flaws in the ISAKMP decoding routines
Package(s): | tcpdump | CVE #(s): | CAN-2003-0989 CAN-2004-0057 CAN-2004-0055 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Created: | January 15, 2004 | Updated: | April 6, 2004 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description: | George Bakos discovered flaws in the ISAKMP decoding routines of tcpdump
versions prior to 3.8.1. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2003-0989 to this issue.
Jonathan Heusser discovered two additional flaws in the ISAKMP decoding routines of tcpdump versions up to and including 3.8.1. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0057 to this issue. Jonathan Heusser discovered a flaw in the print_attr_string function in the RADIUS decoding routines for tcpdump 3.8.1 and earlier. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0055 to this issue. Remote attackers could potentially exploit these issues by sending carefully-crafted packets to a victim. If the victim uses tcpdump, these packets could result in a denial of service, or possibly execute arbitrary code as the 'pcap' user. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Alerts: |
|
Resources
January CRYPTO-GRAM newsletter
Bruce Schneier's CRYPTO-GRAM newsletter for January is out. This issue looks almost exclusively at airline security in one form or another.2003 viruses caused $55B damage, antivirus firm says (ComputerWorld)
ComputerWorld is carrying a Reuters story quoting an antivirus company as estimating the total cost of viruses to businesses in 2003 at $55 billion. What the story doesn't cover is the portion of that cost which is due to Linux-based viruses. That figure is, of course, about $0.
Page editor: Jonathan Corbet
Next page:
Kernel development>>