|
Message-ID: <4D70F25F.6030603@redhat.com> Date: Fri, 04 Mar 2011 15:08:31 +0100 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security <oss-security@...ts.openwall.com>, Stefan Fritsch <sf@...itsch.de>, Jan Kaluza <jkaluza@...hat.com>, Florian Zumbiehl <florz@...rz.de>, Paul Martin <pm@...ian.org>, Petr Uzel <petr.uzel@...e.cz>, Thomas Biege <thomas@...e.de> Subject: CVE Request -- logrotate -- nine issues Hello Josh, Steve, vendors, we have been contacted by Stefan Fritsch of Debian Security Team about presence of nine security flaws in the logrotate utility (the list is provided below). These issues have been discovered by Florian Zumbiehl, some by Paul Martin (the Debian logrotate maintainer) and Stefan Fritsch in the subsequent discussion. Could you allocate CVE ids for these issues? Note: We would appreciate if it would be possible to allocate nine CVE ids (even the request amount being high) because later merge os some issues into one could bring yet more confusion, what are the issues and what would the the corresponding patches (thus potentially even more CVEs needed later due incomplete patches etc). This way the flaws are separated by impact / relevant code affected part. Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team P.S.: Apologize for such a long post, but there wasn't other way how to share all the information at once. =============================================================================== 1) Issue #1: logrotate: TOCTOU race condition by creating the compressed or copied log file (information disclosure) A file access race condition (time-of-check, time-of-use, TOCTOU race condition) was found in the way logrotate determines the permissions to newly created files when compression or copying of a log file has been requested. If the logrotate utility was run on a log file contained within an attacker controllable directory, a local attacker could use this flaw to trick the logrotate utility into creating the compressed or copied file with user selected permissions, potentially leading to disclosure of sensitive information. References: [1] https://bugzilla.redhat.com/show_bug.cgi?id=680787 Source code background (issue reason): [2] https://bugzilla.redhat.com/show_bug.cgi?id=680787#c4 Note: First CVE required. ----------- 2) Issue #2: logrotate: Race condition by creation of new files after renaming the previous version if compression or copy creation requested (arbitrary system file integrity corruption) A race condition was found in the way the logrotate utility created new files after renaming the previous version if compression or creation of a copy was requested in the configuration file. If the logrotate utility was run on a log file contained within an attacker controllable directory, a local attacker could use this flaw to trick the logrotate utility into replacing arbitrary system files (if logrotate was run under privileged user account, root) with the copied or compressed contents of a log file. References: [3] https://bugzilla.redhat.com/show_bug.cgi?id=680789 Source code background (issue reason): [4] https://bugzilla.redhat.com/show_bug.cgi?id=680789#c7 Proposed patch: [5] https://bugzilla.redhat.com/show_bug.cgi?id=680789#c3 Note: Second CVE required. ---------- 3) Issue #3: logrotate: TOCTOU race condition by creation of log files after rotation (ability to change file owner / mode on arbitrary system files) A file access race condition (time-of-check, time-of-use, TOCTOU race condition) was found in the way logrotate utility created the log files after rotation, when their immediate creation ("create" configuration option) was requested. A local attacker could use this flaw to change file owner or mode on arbitrary system files to the file owner and mode specified in logrotate's configuration. (if the logrotate utility was run under privileged user, root, and logrotate was run on an attacker controllable directory). References: [6] https://bugzilla.redhat.com/show_bug.cgi?id=680790 Source code background (issue reason): [7] https://bugzilla.redhat.com/show_bug.cgi?id=680790#c3 Note: Third CVE required. ---------- 4) Issue #4: logrotate: Incorrect flags used for truncating of original log file in copytruncate mode (arbitrary file system truncation via symlink / hardlink attacks) It was found that logrotate utility used incorrect flags for truncation of the original log file in place after creating a copy (copytruncate mode). A local attacker could use this flaw to truncate arbitrary system file (if the logrotate utility was run under privileged user account, root) by performing symlink or hardlink attacks. References: [8] https://bugzilla.redhat.com/show_bug.cgi?id=680792 Note: Fourth CVE required. ------------ 5) Issue #5: logrotate: Information disclosure by performing email notifications An information disclosure flaw was found in the way the logrotate utility performed email notifications about rotating of out of existence log files. A local attacker could use this flaw to conduct symlink or hardlink attacks and send arbitrary system files (if the logrotate utility was run under privileged system user, root) to the selected email recipient. References: [9] https://bugzilla.redhat.com/show_bug.cgi?id=680795 Note: Fifth CVE required. ---------- 6) Issue #6: logrotate: Shell command injection by using the shred configuration directive A shell command injection flaw was found in the way the logrotate utility handled shred configuration directive (intended to ensure the log files are not readable after their scheduled deletion). A local attacker could use this flaw to execute arbitrary system commands (if the logrotate was run under privileged system user account, root) when the logrotate utility was run on a log file, within attacker controllable directory. References: [10] https://bugzilla.redhat.com/show_bug.cgi?id=680796 Proposed patch: [11] https://bugzilla.redhat.com/show_bug.cgi?id=680796#c5 Note: Sixth CVE required. The shred option has been introduced in logrotate v3.7.5. ---------- 7) Issue #7: logrotate: DoS due improper escaping of file names within 'write state' action A denial of service flaw was found in the way the logrotate utility performed arguments sanitization, when performing the 'write state' action. A local attacker could use this flaw to cause abort in subsequent logrotate runs via a specially-crafted log file name. References: [12] https://bugzilla.redhat.com/show_bug.cgi?id=680797 Proposed patch: [13] https://bugzilla.redhat.com/show_bug.cgi?id=680797#c3 Note: Seventh CVE required. ---------- 8) Issue #8: logrotate: TOCTOU race condition by creation of new files (between opening the file and moment, final permissions have been applied) [information disclosure] It was found that logrotate utility used insecure default permissions, when creating of new files (time-of-check, time-of-use, TOCTOU race condition). In some specific configurations, a local attacker could use this flaw to open the new file before the final permissions have been applied, leading to disclosure of sensitive information. A different vulnerability than: [1] https://bugzilla.redhat.com/show_bug.cgi?id=680787 (Issue #1) References: [14] https://bugzilla.redhat.com/show_bug.cgi?id=680798 Source code background (issue reason): [15] https://bugzilla.redhat.com/show_bug.cgi?id=680798#c3 Note: Eight-th CVE required. ---------- 9) Issue #9: logrotate: Improper administration of log files located in world-writable directories A security flaw was found in the way the logrotate utility performed administration of log files, located in group / world writable directories. A local attacker could use this flaw to disclose sensitive information, execute arbitrary code or cause a denial of service, via unintended / unprivileged later modifications of log file directory in question. Different vulnerability than: [1] https://bugzilla.redhat.com/show_bug.cgi?id=680787 (Issue #1), [2] https://bugzilla.redhat.com/show_bug.cgi?id=680789 (Issue #2), [3] https://bugzilla.redhat.com/show_bug.cgi?id=680790 (Issue #3), [4] https://bugzilla.redhat.com/show_bug.cgi?id=680792 (Issue #4), [5] https://bugzilla.redhat.com/show_bug.cgi?id=680795 (Issue #5), [6] https://bugzilla.redhat.com/show_bug.cgi?id=680796 (Issue #6), [7] https://bugzilla.redhat.com/show_bug.cgi?id=680797 (Issue #7), and [8] https://bugzilla.redhat.com/show_bug.cgi?id=680798 (Issue #8). References: [16] https://bugzilla.redhat.com/show_bug.cgi?id=680799 Note: Nineth CVE required. ===============================================================================
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.