Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <545CC5D0.4030309@mittwald.de>
Date: Fri, 7 Nov 2014 14:14:56 +0100
From: Sven Kieske <s.kieske@...twald.de>
To: <oss-security@...ts.openwall.com>
Subject: Re: Re: CVE-Request: dpkg handling of 'control' and
 warnings format string vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



On 07/11/14 02:27, Seth Arnold wrote:
> On Thu, Nov 06, 2014 at 08:00:33PM -0500, cve-assign@...re.org
> wrote:
>>> A format string vulnerability vuln has been found in the latest
>>> version of dpkg. 
>>> https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135
> 
>> Use CVE-2014-8625. We're aware of "does not show evidence of
>> allowing attackers to cross privilege boundaries" in 
>> https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135/comments/2
>> -- we'll certainly look for any discussion on this list that
>> disputes the CVE.
> 
> The build recipes in Debian packaging are all-powerful; they run 
> arbitrary commands and executables with full privileges of the
> user building the package.
> 
> The maintainer scripts in Debian binary packages are all-powerful; 
> they run arbitrary commands and executables with root privileges
> when packages are installed.
> 
> There is no need to resort to format string vulnerabilities in
> control files to execute malicious code in an untrusted package. It
> would be easier and more reliable to simply put malicious code
> directly in the debian/rules file or postinst scripts.
> 
> It is not safe to build packages from untrusted sources. It is not
> safe to install packages from untrusted sources.
> 
> This is why we did not assign a CVE from Ubuntu's CVE pool.

to quote the man page of dpkg:

> --no-act, --dry-run, --simulate Do everything which is supposed to
> be done, but don't write any changes. This is used to see what
> would happen with the specified action, without actually modifying
> anything.

So the users assumes this does not "modify anything"
and if I understood this bug correct this gives at least
access to the stack and allows to write/read memory.

So this is against the defined/intended behaviour, imho
and should thus get a CVE?

- -- 
Mit freundlichen Grüßen / Regards

Sven Kieske

Systemadministrator
Mittwald CM Service GmbH & Co. KG
Königsberger Straße 6
32339 Espelkamp
T: +49-5772-293-100
F: +49-5772-293-333
https://www.mittwald.de
Geschäftsführer: Robert Meyer
St.Nr.: 331/5721/1033, USt-IdNr.: DE814773217, HRA 6640, AG Bad Oeynhausen
Komplementärin: Robert Meyer Verwaltungs GmbH, HRB 13260, AG Bad
Oeynhausen
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
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=7KnX
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.