oss-sec mailing list archives

Re: CVE Request -- net-snmp (sensitive host information disclosure)


From: Jan Lieskovsky <jlieskov () redhat com>
Date: Thu, 12 Feb 2009 18:55:11 +0100

Steve,

  thanks for the assignment!

On Thu, 2009-02-12 at 10:56 -0500, Steven M. Christey wrote:
I'm confused by the upstream diff being referenced by the Red Hat bug ID.
Specifically, it looks like some sprintf's got changed, and the result is
used for logging.  Is it certain that the attacker can bypass
authorization, or is net-snmp just mis-reporting it?

Yes, the fix looks strange, but it resolves the issue (checked for
net-snmp-5.4.2). Looks like net-snmp is mis-reporting
the results, so subsequent parsing performed by tcp_wrappers
fails so hosts, for whose the snmp responses should be
forbidden, are getting them regardless of /etc/hosts.deny
content.

More exact explanation from our pkg-maintainer:

<snip>

So... the bug is in net-snmp, it mixes source and destination IP 
addresses, which renders tcp_wrappers support in snmpd completely 
useless (it checks destination IP addr instead of source IP address).

</snip>

Not sure here, if the CVE description should be modified appropriately?

Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team


I'm going with authorization bypass at the moment.

======================================================
Name: CVE-2008-6123
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6123
Reference: MLIST:[oss-security] 20090212 CVE Request -- net-snmp (sensitive host information disclosure)
Reference: URL:http://www.openwall.com/lists/oss-security/2009/02/12/2
Reference: CNFIRM:http://bugs.gentoo.org/show_bug.cgi?id=250429
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=485211
Reference: CONFIRM:http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367
Reference: 
MISC:http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/trunk/net-snmp/snmplib/snmpUDPDomain.c?r1=17325&r2=17367&pathrev=17367

The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp
5.0.9 through 5.4.2, when using TCP wrappers for client authorization,
does not properly parse hosts.allow rules, which allows remote
attackers to bypass intended access restrictions and execute SNMP
queries, related to "source/destination IP address confusion."




Current thread: