Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 25 Feb 2010 11:47:01 -0700
From: Vincent Danen <vdanen@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
Cc: Frank Eigler <fche@...hat.com>, oss-security@...ts.openwall.com
Subject: incorrect description for CVE-2010-0412 systemtap flaw

Hi Steve and other vendors.  There is a bit of confusion around the
description of CVE-2010-0412.  This was due to some miscommunication as
to whether or not the full extent of the flaw was public, which is why
I didn't send a message sooner to explain why it was assigned.

>Name: CVE-2010-0412
>Status: Candidate
>URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0412
>Final-Decision:
>Interim-Decision:
>Modified:
>Proposed:
>Assigned: 20100127
>Category:
>Reference: MLIST:[scm-commits] 20100215 rpms/systemtap/devel systemtap-1.1-tighten-server-params.patch, NONE, 1.1 systemtap.spec, 1.59, 1.60
>Reference: URL:http://lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.html
>Reference: FEDORA:FEDORA-2010-1373
>Reference: URL:http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html
>Reference: FEDORA:FEDORA-2010-1720
>Reference: URL:http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
>Reference: BID:38316
>Reference: URL:http://www.securityfocus.com/bid/38316
>
>stap-server in SystemTap 1.1 does not properly restrict the value of
>the -B (aka BUILD) option, which allows attackers to have an
>unspecified impact via vectors associated with executing the make
>program, a different vulnerability than CVE-2009-4273.

The original fix for CVE-2009-4273 was incomplete, as noted in the
upstream bug report for the original flaw:

http://sourceware.org/bugzilla/show_bug.cgi?id=11105#c8

This is still the same root flaw as CVE-2009-4273, not a different
vulnerability, so we had assigned CVE-2010-0412 as a "fix for the
incomplete fix of CVE-2009-4273", due to the fact CVE-2009-4273 has this
description:

"stap-server in SystemTap before 1.1 allows remote attackers to execute
arbitrary commands via shell metacharacters in stap command-line
arguments in a request."

The original fix secured only the first link (stap server -> stap), but
the second link (stap -> make) was not fixed.  The -B option is not the
problem so much as an example of the problem.

I think Frank will agree that this is not a new flaw, so the CVE
description should be changed to reflect that.

The -B option is not
the problem so much as an example of the problem.

Upstream's bug report has links to the two patches that solve the
remaining unfixed bits of CVE-2009-4273 (#c10).

Thanks, and my apologies for the confusion on this.

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.