Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2011-4093: security - Re: CVE request: 3 flaws in libobby and libnet6

Integer overflow in inc/server.hpp in libnet6 (aka net6) before 1.3.14 might allow remote attackers to hijack connections and gain privileges as other users by making a large number of connections until the overflow occurs and an ID of another user is provided.

CVE
#web#mac#windows#linux#red_hat#git#php#auth#ssl
  • Products
    • Openwall GNU/*/Linux server OS
    • Linux Kernel Runtime Guard
    • John the Ripper password cracker
      • Free & Open Source for any platform
      • in the cloud
      • Pro for Linux
      • Pro for macOS
    • Wordlists for password cracking
    • passwdqc policy enforcement
      • Free & Open Source for Unix
      • Pro for Windows (Active Directory)
    • yescrypt KDF & password hashing
    • yespower Proof-of-Work (PoW)
    • crypt_blowfish password hashing
    • phpass ditto in PHP
    • tcb better password shadowing
    • Pluggable Authentication Modules
    • scanlogd port scan detector
    • popa3d tiny POP3 daemon
    • blists web interface to mailing lists
    • msulogin single user mode login
    • php_mt_seed mt_rand() cracker
  • Services
  • Publications
    • Articles
    • Presentations
  • Resources
    • Mailing lists
    • Community wiki
    • Source code repositories (GitHub)
    • Source code repositories (CVSweb)
    • File archive & mirrors
    • How to verify digital signatures
    • OVE IDs
  • What’s new

[<prev] [next>] [<thread-prev] [day] [month] [year] [list]

Date: Mon, 31 Oct 2011 09:34:01 -0600 From: Kurt Seifried <kseifried@…hat.com> To: oss-security@…ts.openwall.com CC: Vasiliy Kulikov <segoon@…nwall.com>, Armin Burgmeier <armin@…39.de>, Philipp Kern <phil@…39.de> Subject: Re: CVE request: 3 flaws in libobby and libnet6

On 10/30/2011 06:08 AM, Vasiliy Kulikov wrote:

Hi,

  1. the libobby’s server checks for users’ color collisions before checking users’ passwords. Any user without password authentication may check whether a specific color is used by someone. With knowledge of person’s color preferences he may learn whether a specific person uses the server. Also, he may enumerate all default colors and learn the number of users.

    inc/server_buffer.hpp:

    bool basic_server_buffer<Document, Selector>::on_auth() { … // Check colour if(!basic_buffer<Document, Selector>::check_colour(colour) ) { error = login::ERROR_COLOUR_IN_USE; return false; }

     // Check global password
     if(!m\_global\_password.empty() )
     {
         if(global\_password != m\_global\_password)
         {
             error = login::ERROR\_WRONG\_GLOBAL\_PASSWORD;
             return false;
         }
     }
    

    … }

Please use CVE-2011-4091 for this issue.

  1. libobby doesn’t check server’s SSL certificate and passes the password in plain text over SSL channel. All remote clients are vulnerable to a MITM attack.

    • The attacker (A) learns the client’s © and the server’s (S) IP addresses and used ports. • A breaks the established TCP connection between C and S. • A changes the way C’s packets with dst = S are routed, resulting in all packets from C to S’s IP go to A. The simplest way is ARP cache poisoning. • A starts listening on the same IP:port as S did. • C notices the connection interruption and tries to reconnect to S. (Note: if the client is gobby, this step needs user’s interaction.) • As all C’s packets intended for S are routed to A, so, in reality C connects to A, not S. • C starts SSL session and, as C doesn’t check SSL certificate, he think it talks to S. • A requests C’ password. • C passes the password in plain text over SSL channel.

Please use CVE-2011-4092 for this issue

  1. libnet6 doesn’t check basic_server::id_counter for integer overflow. This number is used to distinguish among different users. An attacker may open UINT_MAX successive connections and get an identifier of the already established connection, resulting in the connection hijacking. On i686 uint is a 32 bit counter, so an attacker should be able to open 4.000.000.000 connections to complete the attack. This is a rather big number: if an attacker may create 2000 connections per second, it would took ~24 days of continuous connection attempts. However, it is a real threat for servers with a huge uptime.

Please use CVE-2011-4093 for this issue.

Note: these are all available from http://gobby.0x539.de/trac/wiki/Download

Thanks,

-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907