Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 01 Mar 2012 22:29:31 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Ludwig Nussel <ludwig.nussel@...e.de>, Dan Williams <dcbw@...hat.com>
Subject: Re: CVE Request: NetworkManager arbitrary file access

On 02/29/2012 02:48 AM, Ludwig Nussel wrote:
> Hi,
> 
> Connections in NetworkManager 0.9 store path names to certificates and
> key files. That means NM (or rather wpa_supplicant which gets
> configured by NM) accesses the user's files as root. A user who is
> allowed to add connections (default for locally logged in users) may
> specify arbitrary file names. NM happily accepts files of any other
> user, including root and even device files. Fortunately it's read
> access only.
> 
> The safe approach would be to stream the actual content of the
> certificate and key files to NM and have NM store that directly.
> In fact NM 0.7 does just that for system connections (but forgets to
> store the key so those connections won't actually work).
> 
> NM 0.6 is also affected.
> 
> Reproducer for NM 0.9 attached, you need to edit the file names and
> then run e.g.
> $ nmw.py new wlan0 yourssid
> 
> cu
> Ludwig
> 

Please use CVE-2012-1096 for this issue.

-- 
Kurt Seifried Red Hat Security Response Team (SRT)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.