oss-sec mailing list archives
Re: CVS-Request: realmd code execution/auth bypass
From: Sebastian Krahmer <krahmer () suse de>
Date: Mon, 30 Mar 2015 17:00:21 +0200
On Wed, Mar 25, 2015 at 04:36:52PM -0400, cve-assign () mitre org wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1Upstream has opened two bugs for issues in realmdThis initial response has a CVE ID only for the second one.could lead to remote attackers logging into the local system by placing an evil AD server in the LAN https://bugs.freedesktop.org/show_bug.cgi?id=89205Is upstream planning to announce this as a vulnerability fix? Although the old behavior was unsafe if there was any possibility of an untrusted device on the LAN, it appears that the old behavior had been intentional. For example, the old behavior may have been chosen as a security/convenience tradeoff. This example might be applicable: https://fedoraproject.org/wiki/QA:Testcase_realmd_join_automatic
Are CVE's only assigned if upstream is issuing fixes? The bug entry reads like that there is something that needs fixing: Attackers can pose as a legit realm (with the same name) so the admin is tricked to join to a rogue AD, allowing an attacker to log into the machine. The admin has no chance to know that he joined an evil AD which has hijacked his legit realm-name. Even when its intentional that the join is automatic for convenience, it should "somehow" be ensured that the legit AD servers are used. Sebastian -- ~ perl self.pl ~ $_='print"\$_=\47$_\47;eval"';eval ~ krahmer () suse de - SuSE Security Team
Current thread:
- CVS-Request: realmd code execution/auth bypass Sebastian Krahmer (Mar 25)
- Re: CVS-Request: realmd code execution/auth bypass Sebastian Krahmer (Mar 25)
- Re: CVS-Request: realmd code execution/auth bypass cve-assign (Mar 25)
- Re: CVS-Request: realmd code execution/auth bypass Sebastian Krahmer (Mar 30)
- Re: CVS-Request: realmd code execution/auth bypass cve-assign (Mar 30)
- Re: CVS-Request: realmd code execution/auth bypass cve-assign (Mar 25)
- Re: CVS-Request: realmd code execution/auth bypass Sebastian Krahmer (Mar 25)