Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 09 Nov 2011 08:33:41 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Jan Lieskovsky <jlieskov@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>,
        Peter Robinson <pbrobinson@...il.com>,
        Ross Burton <ross@...ux.intel.com>, Rob Bradford <rob@...ux.intel.com>,
        Sandu Adrian <dexter@...t3r01.tk>
Subject: Re: CVE Request -- libsocialweb -- Untrusted connection
 opened to Twitter social service without user's approval upon service start
 via dbus

On 11/09/2011 08:14 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,
>
>   a security flaw was found in the way the libsocialweb,
> a social network data aggregator, performed its initialization
> when this service start was initiated by the dbus daemon.
> Due to a deficiency in a way the libsocialweb service was
> initialized, an untrusted (non-SSL) network connection has
> been opened to remote Twitter service servers without explicit
> approval of the user, running the libsocialweb service on the
> local host. A remote attacker could use this flaw to conduct
> various MITM attacks and potentially alter integrity of the user
> account in question.
>
> References:
> [1] https://bugzilla.redhat.com/show_bug.cgi?id=752022
>
> Could you allocate a CVE id for this?
>
> Thank you && Regards, Jan.
> -- 
> Jan iankko Lieskovsky / Red Hat Security Response Team
>
> P.S.: This one being on the border a bit (since clear security
>       consequences of this deficiency not completely investigated),
>       but in any case it's a bad programming practice to open
>       untrusted connection to remote servers by default without
>       particular users' approval (trust boundary crossing).
Please use CVE-2011-4129  for this issue.

-- 

-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ