[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
|
|
Subscribe / Log in / New account

Security

Another Linux capabilities hole found

By Jake Edge
April 15, 2009

A recent patch posted to the linux-kernel mailing list fixes a long-standing flaw in the Linux capabilities implementation. The problem has existed since capabilities were added to the kernel during the 2.1 development series—more than ten years ago. One of the obvious questions is how a bug of that sort could have escaped notice for so long.

The problem was reported in March by Igor Zhbanov, who provided an excellent analysis of the flaw and how it can be exploited. The basic problem lives in the VFS and NFS code which tries to drop privileges, by way of capabilities, before performing operations. The mask of capabilities bits that was used for that purpose does not include CAP_MKNOD (the ability to make a device node entry) or CAP_LINUX_IMMUTABLE (which allows changing the S_APPEND and S_IMMUTABLE file attributes). That means that those capabilities bits are not removed before the file operation is performed.

Zhabanov shows that on a compromised client machine, the root user could give another user CAP_MKNOD, which would allow that user to run the mknod command and create a device entry owned by them. If this was done on an NFS-mounted filesystem, that entry would be created on the server still owned by the user. This works even if the root_squash option—essentially mapping root users on client machines to "nobody" on the server machine—was used on the export.

If the user on the compromised machine can execute code on the server or any other client, they can directly access the device that underlies the device node entry. They will not require any special permissions on the other machines because the device node is owned by them. For example, creating the equivalent of /dev/hda on the server's filesystem might allow direct access to the hard disk block device on any system that had the NFS filesystem mounted. Uglier exploits can certainly be imagined.

This is clearly a nasty problem. Linus Torvalds merged the fix for the recently released 2.6.30-rc2 kernel. One would guess the -stable tree folks won't be too far behind. Serge Hallyn also provided patches for 2.4 and 2.2 kernels, though the latter has become completely unsupported.

The patch was greeted with a question from Valdis Kletnieks: "Wow. How did this manage to stay un-noticed for this long?" Torvalds had a characteristically blunt answer: "Because nobody uses capabilities?" While that might explain how the bug went undetected for so long, it doesn't help alleviate the problem. Whether folks are using capabilities or not is irrelevant, the kernel itself certainly is.

This is not the first time capabilities have been the source of a nasty, exploitable hole. The unfortunately-named "sendmail-capabilities bug" provided a way to gain root privileges by exploiting the way sendmail dropped its privileges. The solution, when this bug was found in 2000, was to "cripple" capabilities in the kernel by disabling capability inheritance. That functionality was not restored until relatively recently.

If distributions and other users were doing more with capabilities, it does seem likely that this particular problem would have been seen sometime in the last decade. But, by and large, Torvalds is right. For one thing, capabilities are a Linux-specific feature, so anyone writing portable code is likely to avoid using them. In addition, they are fairly difficult to wrap your head around; that complexity tends to lead folks to ignore capabilities.

There have been some efforts at using capabilities in distributions more, but one has to wonder how many more exploits still lurk in that code. It is hard to imagine removing capabilities at this late date—it is a user-space interface from the kernel after all—but some must be wondering if the feature is worth all the trouble it has caused.

Comments (8 posted)

New vulnerabilities

clamav: denial of service

Package(s):clamav CVE #(s):
Created:April 14, 2009 Updated:April 15, 2009
Description: From the Ubuntu advisory: It was discovered that ClamAV did not properly verify buffers when processing Upack files. A remote attacker could send a crafted file and cause a denial of service via application crash.
Alerts:
Ubuntu USN-756-1 clamav 2009-04-13

Comments (none posted)

ghostscript: overflows and underflows

Package(s):ghostscript CVE #(s):CVE-2007-6725 CVE-2008-6679 CVE-2009-0196
Created:April 15, 2009 Updated:August 2, 2010
Description: Ghostscript contains a buffer underflow in the CCITTFax decoder (CVE-2007-6725), a buffer overflow in the BaseFont writer module (CVE-2008-6679) and a buffer overflow in the jbig2dec library (CVE-2009-0196).
Alerts:
Gentoo 201412-17 ghostscript-gpl 2014-12-13
Debian DSA-2080-1 ghostscript 2010-08-01
Mandriva MDVSA-2009:311 ghostscript 2009-12-03
Slackware SSA:2009-181-01 ghostscript 2009-06-30
SuSE SUSE-SR:2009:011 java, realplayer, acroread, apache2-mod_security2, cyrus-sasl, wireshark, ganglia-monitor-core, ghostscript-devel, libwmf, libxine1, net-snmp, ntp, openssl 2009-06-09
Mandriva MDVSA-2009:096-1 printer-drivers 2009-04-24
SuSE SUSE-SR:2009:009 openswan/strongswan, clamav, gstreamer-0_10-plugins-base, gnome-panel, postgresql, acroread_ja, ghostscript-devel, xine-devel/libxine-devel, moodle, gnutls, udev 2009-04-21
Red Hat RHSA-2009:0421-01 ghostscript 2009-04-14
Red Hat RHSA-2009:0420-01 ghostscript 2009-04-14
CentOS CESA-2009:0420 ghostscript 2009-04-15
Ubuntu USN-757-1 ghostscript, gs-esp, gs-gpl 2009-04-15
Mandriva MDVSA-2009:096 printer-drivers 2009-04-24
Mandriva MDVSA-2009:095 ghostscript 2009-04-24
CentOS CESA-2009:0421 ghostscript 2009-04-20
rPath rPSA-2009-0060-1 ghostscript 2009-04-17
Fedora FEDORA-2009-3709 ghostscript 2009-04-15
Fedora FEDORA-2009-3710 ghostscript 2009-04-15

Comments (none posted)

ghostscript: integer overflows

Package(s):ghostscript CVE #(s):CVE-2009-0792
Created:April 9, 2009 Updated:August 2, 2010
Description: Ghostscript has multiple integer overflows. The The National Vulnerability Database entry states: Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images. NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.
Alerts:
Gentoo 201412-17 ghostscript-gpl 2014-12-13
Debian DSA-2080-1 ghostscript 2010-08-01
Mandriva MDVSA-2009:311 ghostscript 2009-12-03
Slackware SSA:2009-181-01 ghostscript 2009-06-30
SuSE SUSE-SR:2009:011 java, realplayer, acroread, apache2-mod_security2, cyrus-sasl, wireshark, ganglia-monitor-core, ghostscript-devel, libwmf, libxine1, net-snmp, ntp, openssl 2009-06-09
Mandriva MDVSA-2009:096-1 printer-drivers 2009-04-24
SuSE SUSE-SR:2009:009 openswan/strongswan, clamav, gstreamer-0_10-plugins-base, gnome-panel, postgresql, acroread_ja, ghostscript-devel, xine-devel/libxine-devel, moodle, gnutls, udev 2009-04-21
Fedora FEDORA-2009-3740 argyllcms 2009-04-17
Fedora FEDORA-2009-3720 argyllcms 2009-04-17
Red Hat RHSA-2009:0421-01 ghostscript 2009-04-14
Red Hat RHSA-2009:0420-01 ghostscript 2009-04-14
CentOS CESA-2009:0420 ghostscript 2009-04-15
Ubuntu USN-757-1 ghostscript, gs-esp, gs-gpl 2009-04-15
Fedora FEDORA-2009-3435 argyllcms 2009-04-09
Fedora FEDORA-2009-3430 argyllcms 2009-04-09
Mandriva MDVSA-2009:096 printer-drivers 2009-04-24
Mandriva MDVSA-2009:095 ghostscript 2009-04-24
CentOS CESA-2009:0421 ghostscript 2009-04-20
rPath rPSA-2009-0060-1 ghostscript 2009-04-17
Fedora FEDORA-2009-3709 ghostscript 2009-04-15
Fedora FEDORA-2009-3710 ghostscript 2009-04-15

Comments (none posted)

imp4: cross-site scripting

Package(s):imp4 CVE #(s):CVE-2009-0930
Created:April 13, 2009 Updated:April 1, 2010
Description:

From the Debian advisory:

It was discovered that imp4 is prone to several cross-site scripting (XSS) attacks via several vectors in the mail code allowing attackers to inject arbitrary HTML code.

Alerts:
Fedora FEDORA-2010-5508 imp 2010-04-01
Gentoo 200909-14 horde 2009-09-12
Debian DSA-1770-1 imp4 2009-04-13

Comments (none posted)

mod_perl: cross-site scripting

Package(s):mod_perl CVE #(s):CVE-2009-0796
Created:April 13, 2009 Updated:December 9, 2009
Description:

From the Mandriva advisory:

Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI (CVE-2009-0796).

Alerts:
Mandriva MDVSA-2009:091-1 mod_perl 2009-12-08
Mandriva MDVSA-2009:091 mod_perl 2009-04-12

Comments (none posted)

ntop: world-writable log file

Package(s):ntop CVE #(s):
Created:April 14, 2009 Updated:April 15, 2009
Description: /var/log/ntop/access.log is world writeable if the --access-log-file option is used.
Alerts:
Fedora FEDORA-2009-2805 ntop 2009-03-18

Comments (none posted)

ntp: arbitrary code execution

Package(s):ntp CVE #(s):CVE-2009-0159
Created:April 14, 2009 Updated:December 9, 2009
Description: From the Mandriva advisory: Requesting peer information from a malicious remote time server may lead to an unexpected application termination or arbitrary code execution.
Alerts:
CentOS CESA-2009:1651 ntp 2009-12-08
Red Hat RHSA-2009:1651-01 ntp 2009-12-08
Mandriva MDVSA-2009:309 ntp 2009-12-03
SuSE SUSE-SR:2009:011 java, realplayer, acroread, apache2-mod_security2, cyrus-sasl, wireshark, ganglia-monitor-core, ghostscript-devel, libwmf, libxine1, net-snmp, ntp, openssl 2009-06-09
Slackware SSA:2009-154-01 ntp 2009-06-04
Fedora FEDORA-2009-5273 ntp 2009-05-20
Fedora FEDORA-2009-5275 ntp 2009-05-20
Gentoo 200905-08 ntp 2009-05-26
CentOS CESA-2009:1040 No RH alert RHSA-2009:1040-01 2009-05-21
Ubuntu USN-777-1 ntp 2009-05-19
Debian DSA-1801-1 ntp 2009-05-19
CentOS CESA-2009:1039 ntp 2009-05-19
Red Hat RHSA-2009:1040-02 ntp 2009-05-18
Red Hat RHSA-2009:1039-01 ntp 2009-05-18
Mandriva MDVSA-2009:092 ntp 2009-04-13

Comments (none posted)

openafs: multiple vulnerabilities

Package(s):openafs CVE #(s):CVE-2009-1250 CVE-2009-1251
Created:April 13, 2009 Updated:January 17, 2011
Description:

From the Debian advisory:

An attacker with control of a file server or the ability to forge RX packets may be able to execute arbitrary code in kernel mode on an OpenAFS client, due to a vulnerability in XDR array decoding. (CVE-2009-1251)

An attacker with control of a file server or the ability to forge RX packets may crash OpenAFS clients because of wrongly handled error return codes in the kernel module. (CVE-2009-1250).

Alerts:
Gentoo 201404-05 openafs 2014-04-08
Gentoo 201101-05 openafs 2011-01-16
Mandriva MDVSA-2009:099-1 openafs 2009-12-08
Mandriva MDVSA-2009:099 openafs 2009-04-27
Debian DSA-1768-1 openafs 2009-04-10

Comments (none posted)

php: denial of service

Package(s):php CVE #(s):CVE-2009-1271
Created:April 10, 2009 Updated:January 6, 2010
Description: From the Mandriva advisory: The JSON_parser function (ext/jso/JSON_parser.c) in PHP 5.2.x before 5.2.9 allows remote attackers to cause a denial of service (segmentation fault) via a malformed string to the json_decode API function.
Alerts:
Gentoo 201001-03 php 2010-01-05
Mandriva MDVSA-2009:324 php 2009-12-07
SuSE SUSE-SR:2009:012 optipng, cups, quagga, pango, strongswan, perl-DBD-Pg, irssi, openssl/libopenssl-devel, net-snmp, ImageMagick/GraphicsMagick, perl, ipsec-tools/novell-ipsec-tools, poppler/libpoppler3/libpoppler4, yast2-ldap-server, tomcat6, gstreamer-plugins/gstreamer010-plugins-bad, apache2-mod_php5 2009-07-03
Fedora FEDORA-2009-3768 php 2009-04-21
Fedora FEDORA-2009-3848 php 2009-04-21
Debian DSA-1789-1 php5 2009-05-04
Ubuntu USN-761-2 php5 2009-04-27
Ubuntu USN-761-1 php5 2009-04-20
Red Hat RHSA-2009:0350-01 php 2009-04-14
Mandriva MDVSA-2009:090 php 2009-04-10
Debian DSA-1775-1 php-json-ext 2009-04-20

Comments (none posted)

pptp: file permission problem

Package(s):pptp CVE #(s):
Created:April 9, 2009 Updated:April 15, 2009
Description: pptp has a file permission problem. From the Fedora 10 alert: This update corrects the behaviour of pptpsetup when its --delete option is used, retaining the permissions of /etc/ppp/chap-secrets rather than creating a new file that is likely to be world-readable. If you have previously used the --delete option of pptpsetup, you should reset the permissions of /etc/ppp/chap- secrets to their default value of 0600 unless you have good reasons to use another value: # chmod 600 /etc/ppp/chap-secrets.
Alerts:
Fedora FEDORA-2009-3070 pptp 2009-03-26

Comments (none posted)

seamonkey: XSL Transformation vulnerability

Package(s):seamonkey CVE #(s):
Created:April 14, 2009 Updated:April 15, 2009
Description: See Security Advisories for SeaMonkey 1.1: SeaMonkey 1.1.16 fixes an XSL Transformation vulnerability.
Alerts:
Slackware SSA:2009-103-01 seamonkey 2009-04-14

Comments (none posted)

tor: multiple vulnerabilities

Package(s):tor CVE #(s):CVE-2008-5397 CVE-2008-5398 CVE-2009-0414 CVE-2009-0939 CVE-2009-0936 CVE-2009-0937 CVE-2009-0938
Created:April 9, 2009 Updated:April 15, 2009
Description: Tor has a number of vulnerabilities. From the Gentoo alert:

* Theo de Raadt reported that the application does not properly drop privileges to the primary groups of the user specified via the "User" configuration option (CVE-2008-5397).

* rovv reported that the "ClientDNSRejectInternalAddresses" configuration option is not always enforced (CVE-2008-5398).

* Ilja van Sprundel reported a heap-corruption vulnerability that might be remotely triggerable on some platforms (CVE-2009-0414).

* It has been reported that incomplete IPv4 addresses are treated as valid, violating the specification (CVE-2009-0939).

* Three unspecified vulnerabilities have also been reported (CVE-2009-0936, CVE-2009-0937, CVE-2009-0938).

Alerts:
Gentoo 200904-11 tor 2009-04-08

Comments (none posted)

wireshark: multiple vulnerabilities

Package(s):wireshark CVE #(s):CVE-2009-1210 CVE-2009-1268 CVE-2009-1269
Created:April 10, 2009 Updated:December 7, 2009
Description: From the Mandriva advisory:

The PROFINET dissector was vulnerable to a format string overflow (CVE-2009-1210).

The Check Point High-Availability Protocol (CPHAP) dissecto could crash (CVE-2009-1268).

Wireshark could crash while loading a Tektronix .rf5 file (CVE-2009-1269).

Alerts:
Fedora FEDORA-2009-7998 wireshark 2009-07-24
Gentoo 200906-05 wireshark 2009-06-30
CentOS CESA-2009:1100 wireshark 2009-06-16
Red Hat RHSA-2009:1100-01 wireshark 2009-06-15
SuSE SUSE-SR:2009:011 java, realplayer, acroread, apache2-mod_security2, cyrus-sasl, wireshark, ganglia-monitor-core, ghostscript-devel, libwmf, libxine1, net-snmp, ntp, openssl 2009-06-09
Debian DSA-1942-1 wireshark 2009-11-29
Fedora FEDORA-2009-5382 wireshark 2009-05-25
Fedora FEDORA-2009-5339 wireshark 2009-05-25
Fedora FEDORA-2009-3599 wireshark 2009-04-13
Debian DSA-1785-1 wireshark 2009-05-01
rPath rPSA-2009-0062-1 tshark 2009-04-17
Mandriva MDVSA-2009:088 wireshark 2009-04-09

Comments (none posted)

wordpress-mu: cross-site scripting vulnerability

Package(s):wordpress-mu CVE #(s):CVE-2009-1030
Created:April 9, 2009 Updated:August 18, 2009
Description: From the National Vulnerability Database entry: Cross-site scripting (XSS) vulnerability in the choose_primary_blog function in wp-includes/wpmu-functions.php in WordPress MU (WPMU) before 2.7 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header.
Alerts:
Fedora FEDORA-2009-8538 wordpress-mu 2009-08-15
Fedora FEDORA-2009-3474 wordpress-mu 2009-04-09

Comments (none posted)

xine-lib: integer overflow

Package(s):xine-lib CVE #(s):CVE-2009-1274
Created:April 9, 2009 Updated:June 1, 2010
Description: From the National Vulnerability Database entry: Integer overflow in the qt_error parse_trak_atom function in demuxers/demux_qt.c in xine-lib 1.1.16.2 and earlier allows remote attackers to execute arbitrary code via a Quicktime movie file with a large count value in an STTS atom, which triggers a heap-based buffer overflow.
Alerts:
Gentoo 201006-04 xine-lib 2010-06-01
Mandriva MDVSA-2009:319 xine-lib 2009-12-05
Mandriva MDVSA-2009:298 xine-lib 2009-11-13
SuSE SUSE-SR:2009:011 java, realplayer, acroread, apache2-mod_security2, cyrus-sasl, wireshark, ganglia-monitor-core, ghostscript-devel, libwmf, libxine1, net-snmp, ntp, openssl 2009-06-09
Mandriva MDVSA-2009:299 xine-lib 2009-11-13
Ubuntu USN-763-1 xine-lib 2009-04-20
Fedora FEDORA-2009-3433 xine-lib 2009-04-09
Fedora FEDORA-2009-3428 xine-lib 2009-04-09

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2009, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds