Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 09 Nov 2011 08:33:41 -0700
From: Kurt Seifried <>
CC: Jan Lieskovsky <>,
        "Steven M. Christey" <>,
        Peter Robinson <>,
        Ross Burton <>, Rob Bradford <>,
        Sandu Adrian <>
Subject: Re: CVE Request -- libsocialweb -- Untrusted connection
 opened to Twitter social service without user's approval upon service start
 via dbus

On 11/09/2011 08:14 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,
>   a security flaw was found in the way the libsocialweb,
> a social network data aggregator, performed its initialization
> when this service start was initiated by the dbus daemon.
> Due to a deficiency in a way the libsocialweb service was
> initialized, an untrusted (non-SSL) network connection has
> been opened to remote Twitter service servers without explicit
> approval of the user, running the libsocialweb service on the
> local host. A remote attacker could use this flaw to conduct
> various MITM attacks and potentially alter integrity of the user
> account in question.
> References:
> [1]
> Could you allocate a CVE id for this?
> Thank you && Regards, Jan.
> -- 
> Jan iankko Lieskovsky / Red Hat Security Response Team
> P.S.: This one being on the border a bit (since clear security
>       consequences of this deficiency not completely investigated),
>       but in any case it's a bad programming practice to open
>       untrusted connection to remote servers by default without
>       particular users' approval (trust boundary crossing).
Please use CVE-2011-4129  for this issue.


-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ