lsh-server: lshd leaks fd:s to user shells

Related Vulnerabilities: CVE-2006-0353  

Debian Bug report logs - #349303
lsh-server: lshd leaks fd:s to user shells

version graph

Reported by: Stefan Pfetzing <dreamind@dreamind.de>

Date: Sun, 22 Jan 2006 05:18:04 UTC

Severity: grave

Tags: confirmed, sarge, security

Found in version lsh-server/2.0.1cdbs-3

Fixed in version lsh-utils/2.0.1cdbs-4

Done: Stefan Pfetzing <dreamind@dreamind.de>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Security Team <team@security.debian.org>, Simon Law <sfllaw@debian.org>:
Bug#349303; Package lsh-server. (full text, mbox, link).


Acknowledgement sent to Stefan Pfetzing <dreamind@dreamind.de>:
New Bug report received and forwarded. Copy sent to Debian Security Team <team@security.debian.org>, Simon Law <sfllaw@debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Stefan Pfetzing <dreamind@dreamind.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: lsh-server: lshd leaks fd:s to user shells
Date: Sun, 22 Jan 2006 06:14:59 +0100
Package: lsh-server
Version: 2.0.1cdbs-3
Severity: grave
Tags: security
Tags: sarge
Tags: confirmed
Tags: pending
Justification: denial of service

As reported by Niels Möller, the author of lsh-utils, a user is able to
access fd:s used by lsh.

When logging in through lsh-server a user is able to tamper with
/var/spool/yarrow-seed-file, which can be used to prevent the server
from starting or allow the user guesses about the encryption used by
lsh-server.

Therefore its strongly suggested to apply the patch from Niels.

http://lists.lysator.liu.se/pipermail/lsh-bugs/2006q1/000467.html

Unstable will get a new version including the fix soon.

-- system information excluded
-- debconf information excluded

bye

Stefan Pfetzing

-- 
        http://www.dreamind.de/
Oroborus and Debian GNU/Linux Developer.



Information forwarded to debian-bugs-dist@lists.debian.org, Simon Law <sfllaw@debian.org>:
Bug#349303; Package lsh-server. (full text, mbox, link).


Acknowledgement sent to Stefan Pfetzing <dreamind@dreamind.de>:
Extra info received and forwarded to list. Copy sent to Simon Law <sfllaw@debian.org>. (full text, mbox, link).


Message #10 received at 349303@bugs.debian.org (full text, mbox, reply):

From: Stefan Pfetzing <dreamind@dreamind.de>
To: 349303@bugs.debian.org
Subject: Wrongly set tags on the bugreport
Date: Sun, 22 Jan 2006 06:47:01 +0100
Tags: security sarge confirmed

Thanks.

bye

Stefan

-- 
        http://www.dreamind.de/
Oroborus and Debian GNU/Linux Developer.






Tags added: security, sarge, confirmed Request was from Stefan Pfetzing <dreamind@dreamind.de> to control@bugs.debian.org. (full text, mbox, link).


Reply sent to Stefan Pfetzing <dreamind@dreamind.de>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Stefan Pfetzing <dreamind@dreamind.de>:
Bug acknowledged by developer. (full text, mbox, link).


Message #17 received at 349303-close@bugs.debian.org (full text, mbox, reply):

From: Stefan Pfetzing <dreamind@dreamind.de>
To: 349303-close@bugs.debian.org
Subject: Bug#349303: fixed in lsh-utils 2.0.1cdbs-4
Date: Sat, 21 Jan 2006 22:17:11 -0800
Source: lsh-utils
Source-Version: 2.0.1cdbs-4

We believe that the bug you reported is fixed in the latest version of
lsh-utils, which is due to be installed in the Debian FTP archive:

lsh-client_2.0.1cdbs-4_i386.deb
  to pool/main/l/lsh-utils/lsh-client_2.0.1cdbs-4_i386.deb
lsh-server_2.0.1cdbs-4_i386.deb
  to pool/main/l/lsh-utils/lsh-server_2.0.1cdbs-4_i386.deb
lsh-utils-doc_2.0.1cdbs-4_all.deb
  to pool/main/l/lsh-utils/lsh-utils-doc_2.0.1cdbs-4_all.deb
lsh-utils_2.0.1cdbs-4.diff.gz
  to pool/main/l/lsh-utils/lsh-utils_2.0.1cdbs-4.diff.gz
lsh-utils_2.0.1cdbs-4.dsc
  to pool/main/l/lsh-utils/lsh-utils_2.0.1cdbs-4.dsc
lsh-utils_2.0.1cdbs-4_i386.deb
  to pool/main/l/lsh-utils/lsh-utils_2.0.1cdbs-4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 349303@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Stefan Pfetzing <dreamind@dreamind.de> (supplier of updated lsh-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 22 Jan 2006 06:30:43 +0100
Source: lsh-utils
Binary: lsh-utils lsh-client lsh-utils-doc lsh-server
Architecture: source all i386
Version: 2.0.1cdbs-4
Distribution: unstable
Urgency: high
Maintainer: Simon Law <sfllaw@debian.org>
Changed-By: Stefan Pfetzing <dreamind@dreamind.de>
Description: 
 lsh-client - Secure Shell v2 (SSH2) protocol client
 lsh-server - Secure Shell v2 (SSH2) protocol server
 lsh-utils  - Secure Shell v2 (SSH2) protocol utilities
 lsh-utils-doc - Secure Shell v2 (SSH2) client / server / utilities documentation
Closes: 337026 348822 348844 349180 349303
Changes: 
 lsh-utils (2.0.1cdbs-4) unstable; urgency=high
 .
   * Remove silly debconf questions and correct others. (Closes: Bug#337026)
   * Switch to dpatch.
   * Make lsh-utils build on a grsecurity system.
   * Remove /var/spool/lsh upon purge.
   * Update Vietnamese debconf translation.
   * Update German debconf translation.
   * Update Danish debconf translation.
   * Update Czech debconf translation.
   * Update Dutch debconf translation.
   * Update Russian debconf translation. (Closes: Bug#349180)
   * Update French debconf translation. (Closes: Bug#348822)
   * Have lsh-server provide ssh-server. (Closes: Bug#348844)
   * Update the watch file format version to the latest (3).
   * Have uscan remove the "cdbs" version extension.
   * Fix fd leak in the lsh-server.
     This is to be security related, so upload it with a high urgency.
     (Closes: Bug#349303)
Files: 
 91eb4d44578221b8730c089188cccc58 929 net extra lsh-utils_2.0.1cdbs-4.dsc
 6b7233c922cde42f71f69183edced51a 39596 net extra lsh-utils_2.0.1cdbs-4.diff.gz
 30c201de019f9080b987cc61e03c4863 105566 doc extra lsh-utils-doc_2.0.1cdbs-4_all.deb
 958f2a7676eb9f03d031c82c9d4ab9d6 726476 net extra lsh-utils_2.0.1cdbs-4_i386.deb
 12cd4839061a6c8bb549c1bc7145dfe1 203794 net extra lsh-server_2.0.1cdbs-4_i386.deb
 9c98e5855e91d484f1d10ddae35c50f8 244636 net extra lsh-client_2.0.1cdbs-4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFD0x/hi50xCpfDmMsRAiEgAJ9cqgz/rFsup8Bh4Lx+ouM5s5SfswCdH3gK
Lvt291GQtGxIa70k/wnmu9Y=
=ZYU5
-----END PGP SIGNATURE-----




Information forwarded to debian-bugs-dist@lists.debian.org, Simon Law <sfllaw@debian.org>:
Bug#349303; Package lsh-server. (full text, mbox, link).


Acknowledgement sent to Martin Schulze <joey@infodrom.org>:
Extra info received and forwarded to list. Copy sent to Simon Law <sfllaw@debian.org>. (full text, mbox, link).


Message #22 received at 349303@bugs.debian.org (full text, mbox, reply):

From: Martin Schulze <joey@infodrom.org>
To: Stefan Pfetzing <dreamind@dreamind.de>
Cc: Debian Bug Tracking System <349303@bugs.debian.org>
Subject: Re: Bug#349303: lsh-server: lshd leaks fd:s to user shells
Date: Sun, 22 Jan 2006 09:52:44 +0100
Stefan Pfetzing wrote:
> Package: lsh-server
> Version: 2.0.1cdbs-3
> Severity: grave
> Tags: security
> Tags: sarge
> Tags: confirmed
> Tags: pending
> Justification: denial of service
> 
> As reported by Niels Möller, the author of lsh-utils, a user is able to
> access fd:s used by lsh.
> 
> When logging in through lsh-server a user is able to tamper with
> /var/spool/yarrow-seed-file, which can be used to prevent the server
> from starting or allow the user guesses about the encryption used by
> lsh-server.
> 
> Therefore its strongly suggested to apply the patch from Niels.
> 
> http://lists.lysator.liu.se/pipermail/lsh-bugs/2006q1/000467.html
> 
> Unstable will get a new version including the fix soon.

Please let us know which version in sid will fix the problem.

I've requested a CVE name and will provide it asap.

Regards,

	Joey

-- 
Have you ever noticed that "General Public Licence" contains the word "Pub"?

Please always Cc to me when replying to me on the lists.



Information forwarded to debian-bugs-dist@lists.debian.org, Simon Law <sfllaw@debian.org>:
Bug#349303; Package lsh-server. (full text, mbox, link).


Acknowledgement sent to Stefan Pfetzing <dreamind@dreamind.de>:
Extra info received and forwarded to list. Copy sent to Simon Law <sfllaw@debian.org>. (full text, mbox, link).


Message #27 received at 349303@bugs.debian.org (full text, mbox, reply):

From: Stefan Pfetzing <dreamind@dreamind.de>
To: Martin Schulze <joey@infodrom.org>
Cc: Debian Bug Tracking System <349303@bugs.debian.org>
Subject: Re: Bug#349303: lsh-server: lshd leaks fd:s to user shells
Date: Sun, 22 Jan 2006 11:17:44 +0100
Hi Joey,

Am 22.01.2006 um 09:52 schrieb Martin Schulze:

> Please let us know which version in sid will fix the problem.
>
> I've requested a CVE name and will provide it asap.

lsh-utilis 2.0.1cdbs-4 includes a dpatch file in debian/patches which  
fixes the problem.

bye

Stefan

-- 
        http://www.dreamind.de/
Oroborus and Debian GNU/Linux Developer.






Information forwarded to debian-bugs-dist@lists.debian.org, Simon Law <sfllaw@debian.org>:
Bug#349303; Package lsh-server. (full text, mbox, link).


Acknowledgement sent to Martin Schulze <joey@infodrom.org>:
Extra info received and forwarded to list. Copy sent to Simon Law <sfllaw@debian.org>. (full text, mbox, link).


Message #32 received at 349303@bugs.debian.org (full text, mbox, reply):

From: Martin Schulze <joey@infodrom.org>
To: Stefan Pfetzing <dreamind@dreamind.de>
Cc: Debian Bug Tracking System <349303@bugs.debian.org>, Debian Security Team <team@security.debian.org>
Subject: Re: Bug#349303: lsh-server: lshd leaks fd:s to user shells
Date: Sun, 22 Jan 2006 19:50:19 +0100
Stefan Pfetzing wrote:
> >Please let us know which version in sid will fix the problem.
> >
> >I've requested a CVE name and will provide it asap.
> 
> lsh-utilis 2.0.1cdbs-4 includes a dpatch file in debian/patches which  
> fixes the problem.

Please use CVE-2006-0353 for this vulnerability.

Regards,

	Joey

-- 
Have you ever noticed that "General Public Licence" contains the word "Pub"?

Please always Cc to me when replying to me on the lists.



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 24 Jun 2007 09:34:14 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 14:58:28 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.