|
Message-Id: <1234461311.8920.9.camel@dhcp-lab-164.englab.brq.redhat.com> Date: Thu, 12 Feb 2009 18:55:11 +0100 From: Jan Lieskovsky <jlieskov@...hat.com> To: oss-security@...ts.openwall.com Cc: "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE Request -- net-snmp (sensitive host information disclosure) Steve, thanks for the assignment! On Thu, 2009-02-12 at 10:56 -0500, Steven M. Christey wrote: > I'm confused by the upstream diff being referenced by the Red Hat bug ID. > Specifically, it looks like some sprintf's got changed, and the result is > used for logging. Is it certain that the attacker can bypass > authorization, or is net-snmp just mis-reporting it? Yes, the fix looks strange, but it resolves the issue (checked for net-snmp-5.4.2). Looks like net-snmp is mis-reporting the results, so subsequent parsing performed by tcp_wrappers fails so hosts, for whose the snmp responses should be forbidden, are getting them regardless of /etc/hosts.deny content. More exact explanation from our pkg-maintainer: <snip> So... the bug is in net-snmp, it mixes source and destination IP addresses, which renders tcp_wrappers support in snmpd completely useless (it checks destination IP addr instead of source IP address). </snip> Not sure here, if the CVE description should be modified appropriately? Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team > > I'm going with authorization bypass at the moment. > > ====================================================== > Name: CVE-2008-6123 > Status: Candidate > URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6123 > Reference: MLIST:[oss-security] 20090212 CVE Request -- net-snmp (sensitive host information disclosure) > Reference: URL:http://www.openwall.com/lists/oss-security/2009/02/12/2 > Reference: CNFIRM:http://bugs.gentoo.org/show_bug.cgi?id=250429 > Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=485211 > Reference: CONFIRM:http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367 > Reference: MISC:http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/trunk/net-snmp/snmplib/snmpUDPDomain.c?r1=17325&r2=17367&pathrev=17367 > > The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp > 5.0.9 through 5.4.2, when using TCP wrappers for client authorization, > does not properly parse hosts.allow rules, which allows remote > attackers to bypass intended access restrictions and execute SNMP > queries, related to "source/destination IP address confusion." > >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.