Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 16 Oct 2013 00:20:08 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com, Michael Scherer <mscherer@...hat.com>,
        info@...tstack.com
Subject: Re: CVE request for saltstack minion identity usurpation

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/15/2013 11:54 PM, Kurt Seifried wrote:
> On 10/11/2013 04:26 PM, Michael Scherer wrote:
>> Hi,
> 
>> While looking for saltstack issues on github, i stumbled on this 
>> pull request : https://github.com/saltstack/salt/pull/7356
> 
>> It seems that saltstack, a client/server configuration system ( 
>> like puppet, chef, cfengine ) allowed to have any minions (
>> agent on the server to be configured ) to masquerade itself as
>> any others agents when requesting stuff from the master ( ie,
>> main server ). While I didn't fully check, this would permit a
>> compromised server to request data from another server, thus
>> leading to potential informations leak ( like passwword, etc ).
> 
>> Can a CVE be assigned, and I will pass it to upstream on the bug
>>  report ?
> 
> Ok mmcallis@ researched these and found:
> 
> CVE-2013-4435 saltstack Insufficient argument validation in
> several modules
> 
> CVE-2013-4436 saltstack MITM ssh attack on salt-ssh
> 
> CVE-2013-4437 saltstack Insecure usage of a predictable directory
> in /tmp and on minion (CVE MERGE of two tmp issues)
> 
> CVE-2013-4438 saltstack pillar.ext or qemu_nbd.clear yaml string
> RCE

Argh. The above are currently embargoed, I misunderstood and thought
they were public (along with the following one). My apologies,
especially to upstream and users of saltstack. Adding saltstack info@
to the CC (can't find a security address).

> CVE-2013-4439 saltstack minion identity usurpation



- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=nPX+
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.