oss-sec mailing list archives
Re: KDE Paste Applet
From: Kurt Seifried <kseifried () redhat com>
Date: Tue, 25 Jun 2013 23:06:46 -0600
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 06/25/2013 10:39 PM, Michael Samuel wrote:
On 13 June 2013 10:02, Michael Samuel <mik () miknet net> wrote:Ok, so the fix for this uses KRandom::random()... I suggest leaving the KDE Paste fix as-is and replacing KRandom with something that just fills an integer from /dev/urandom - then we can save a few CVE numbers for the rest of the year. qrand() should probably also do the same, especially since cnonces for HTTP auth are using it - that means there's only 2^32 (at best) possible cnonces...Fedora and Ubuntu have both pushed out this patch. Requesting a new CVE for "KRandom::random() isn't a secure PRNG", since the KDE guys are convinced that it is. Regards, Michael
So the thing is it can be completely random, just like a coin flip. But the search space might be to small (e.g. a 1 bit key based on a coin flip wouldn't be "secure"). I suspect 2^32 isn't enough any more either, assuming a 480 core GPU, if you can run 250 cracking attempts per second per core you can brute force a 2^32 search space in 10 hours or so. Needless to say GPUs are getting pretty cheap. So this appears to be a textbook example of CWE-334 "Small Space of Random Values". Please use CVE-2013-2213 for KDE KRandom::random() CWE-334: Small Space of Random Values. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJRynbmAAoJEBYNRVNeJnmTj68P/i+bSIxKTJpd1Hz6o+hLBioi EJwbFDLz1sMd+cmU49LM+fGd5Rv9irPqbudNY9yGXBxn+lwTsygNLbXB427x7FJz xjPNkmmSyG9+DHDNGyY+O1kDUCtIJ0rwlueHZ4+5AGhYE2FdeNdVs5hr5n6EzIGw R3f0pRZVuiCK9ty2j+RGjkWxDquAD3Ro2iJC6IVwd2S/TUc7idcLxOM6FJNgPibT UFLCKn/HiD/dzsCDnun+BOMMPM76kHkN3sFfZAReYFYM31+1zA8n+UqzKJqokPev t0QISM4w5eGP5zNw2gonemc1/7Rqi5xa+t7VACVyVt/UQds/H9Hez/xe1j9+iAAh BpmELpPPt3/jM4DdCPdEATT6IZGxlBwxKJ19Tq08ub3A+059cBpBKtI6/r0q3IXm guMzbFwLYSUEX2LcfcK6IPBJnZFxuuv1bI7OevWzT018/ctUiu7Thx2OP6WYDe1A BtJs4vqHc4tAyq30IBb9+xCwgESZcLMlD8XiTBIp0haIg9hbOXLyAEbMmuBvTdZv WH09qDrmPoBmS3eDfbPg+Fh0RTcw8Kb55xvEUr4yMxSqJRGktXSJKAon2d9T3WJp LHOgqyuYQ5QFx+rdNm4lmNeitrGQRcOCTYPjTy4eL1geKIaUfe6358Dlt49b7Ktl rvZ6qnjvz8YfA5BbhJAe =sRNF -----END PGP SIGNATURE-----
Current thread:
- KDE Paste Applet Michael Samuel (May 28)
- Re: KDE Paste Applet Kurt Seifried (May 29)
- Re: KDE Paste Applet Michael Samuel (May 30)
- Re: KDE Paste Applet Jeff Mitchell (May 31)
- Re: KDE Paste Applet Michael Samuel (Jun 12)
- Re: KDE Paste Applet Michael Samuel (Jun 25)
- Re: KDE Paste Applet Kurt Seifried (Jun 25)
- Re: KDE Paste Applet Garth Mollett (Jun 26)
- Re: KDE Paste Applet Michael Samuel (May 30)
- Re: KDE Paste Applet Kurt Seifried (May 29)