irssi: CVE-2016-7553: information disclosure vulnerability in buf.pl

Related Vulnerabilities: CVE-2016-7553  

Debian Bug report logs - #838762
irssi: CVE-2016-7553: information disclosure vulnerability in buf.pl

version graph

Package: irssi; Maintainer for irssi is Rhonda D'Vine <rhonda@debian.org>; Source for irssi is src:irssi (PTS, buildd, popcon).

Reported by: Holger Levsen <holger@layer-acht.org>

Date: Sat, 24 Sep 2016 13:27:05 UTC

Severity: important

Tags: patch, security, upstream

Found in versions irssi/0.8.15-5, irssi/0.8.20-1

Fixed in version 0.8.20-2

Done: Rhonda D'Vine <rhonda@deb.at>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Rhonda D'Vine <rhonda@debian.org>:
Bug#838762; Package irssi. (Sat, 24 Sep 2016 13:27:08 GMT) (full text, mbox, link).


Acknowledgement sent to Holger Levsen <holger@layer-acht.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Rhonda D'Vine <rhonda@debian.org>. (Sat, 24 Sep 2016 13:27:08 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Holger Levsen <holger@layer-acht.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: irssi: information disclosure vulnerabilit in buf.pl (CWE-732, CWE-538)
Date: Sat, 24 Sep 2016 15:24:23 +0200
[Message part 1 (text/plain, inline)]
Package: irssi
Version: 0.8.20
Severity: important
Tags: security patch upstream

Hi,

as discussed on irc, it seems irssi in Debian is still affected by
https://irssi.org/2016/09/22/buf.pl-update/

To quote from there:

---beginn---
buf.pl update available

Posted on September 22nd 2016 

An information disclosure vulnerability was found, reported and fixed in the buf.pl script by its author.

CWE Classification: CWE-732, CWE-538
Impact

Other users on the same machine may be able to retrieve the whole window contents after /UPGRADE when the buf.pl script is loaded. Furthermore, this dump of the windows contents is never removed afterwards.

Since buf.pl is also an Irssi core script and we recommended its use to retain your window content, many people could potentially be affected by this.

Remote users may be able to retrieve these contents when combined with other path traversal vulnerabilities in public facing services on that machine.
Detailed analysis

buf.pl restores the scrollbuffer between “/upgrade”s by writing the contents to a file, and reading that after the new process was spawned. Through that file, the contents of (private) chat conversations may leak to other users.
Mitigating facts

Careful users with a limited umask (e.g. 077) are not affected by this bug. However, most Linux systems default to a umask of 022, meaning that files written without further restricting the permissions, are readable by any user.
Affected versions

All up to 2.13
Fixed versions

buf.pl 2.20
Resolution

Update the buf.pl script with the latest version from scripts.irssi.org.

---end---

Thanks for maintaining irssi!


-- 
cheers,
	Holger
[signature.asc (application/pgp-signature, inline)]

Changed Bug title to 'irssi: information disclosure vulnerability in buf.pl (CWE-732, CWE-538)' from 'irssi: information disclosure vulnerabilit in buf.pl (CWE-732, CWE-538)'. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 24 Sep 2016 13:39:04 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Rhonda D'Vine <rhonda@debian.org>:
Bug#838762; Package irssi. (Sat, 24 Sep 2016 13:51:02 GMT) (full text, mbox, link).


Acknowledgement sent to Holger Levsen <holger@layer-acht.org>:
Extra info received and forwarded to list. Copy sent to Rhonda D'Vine <rhonda@debian.org>. (Sat, 24 Sep 2016 13:51:02 GMT) (full text, mbox, link).


Message #12 received at 838762@bugs.debian.org (full text, mbox, reply):

From: Holger Levsen <holger@layer-acht.org>
To: 838762@bugs.debian.org
Subject: Re: Bug#838762: Acknowledgement (irssi: information disclosure vulnerabilit in buf.pl (CWE-732, CWE-538))
Date: Sat, 24 Sep 2016 15:48:10 +0200
[Message part 1 (text/plain, inline)]
Hi,

this issue also seems to be known as https://security-tracker.debian.org/tracker/TEMP-0838762-63158A


-- 
cheers,
	Holger
[signature.asc (application/pgp-signature, inline)]

No longer marked as found in versions 0.8.20. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 24 Sep 2016 13:57:02 GMT) (full text, mbox, link).


Marked as found in versions irssi/0.8.20-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 24 Sep 2016 13:57:03 GMT) (full text, mbox, link).


Reply sent to Holger Levsen <holger@layer-acht.org>:
You have taken responsibility. (Sat, 24 Sep 2016 16:57:03 GMT) (full text, mbox, link).


Notification sent to Holger Levsen <holger@layer-acht.org>:
Bug acknowledged by developer. (Sat, 24 Sep 2016 16:57:03 GMT) (full text, mbox, link).


Message #21 received at 838762-done@bugs.debian.org (full text, mbox, reply):

From: Holger Levsen <holger@layer-acht.org>
To: 838762-done@bugs.debian.org
Subject: Re: Accepted irssi 0.8.20-2 (source amd64) into unstable
Date: Sat, 24 Sep 2016 16:53:24 +0000
[Message part 1 (text/plain, inline)]
version: 0.8.20-2
thanks

On Sat, Sep 24, 2016 at 04:43:52PM +0000, Rhonda D'Vine wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
> 
> Format: 1.8
> Date: Sat, 24 Sep 2016 16:10:19 +0200
> Source: irssi
> Binary: irssi irssi-dev
> Architecture: source amd64
> Version: 0.8.20-2
> Distribution: unstable
> Urgency: high
> Maintainer: Rhonda D'Vine <rhonda@debian.org>
> Changed-By: Rhonda D'Vine <rhonda@debian.org>
> Description:
>  irssi      - terminal based IRC client
>  irssi-dev  - terminal based IRC client - development files
> Changes:
>  irssi (0.8.20-2) unstable; urgency=high
>  .
>    * New patch 23fix-buf.pl to fix an information exposure issue involved with
>      using buf.pl and /upgrade.
> Checksums-Sha1:
>  def03f586553e19592a5bfe7a0cadb4543a0feb1 1903 irssi_0.8.20-2.dsc
>  8372c1a9efb370cb6521f8bb76c38920286fbcc2 19808 irssi_0.8.20-2.debian.tar.xz
>  5836793d1294143019ba8457dd3277d1120bcb37 2926256 irssi-dbgsym_0.8.20-2_amd64.deb
>  685cbb6597ede7775a2e54e518059a9f26952780 423014 irssi-dev_0.8.20-2_amd64.deb
>  ab976cdf6c35fb1324eeb6a6d4214878d86abc2c 1038988 irssi_0.8.20-2_amd64.deb
> Checksums-Sha256:
>  52b348a2c581b089f6d7aeeada9fb3a17e5921aa2711393c4471ec7547dc5c72 1903 irssi_0.8.20-2.dsc
>  656ac9fc1d04e68359fdb6d698fbab21b00ec85e4285fc5310904601d8dad474 19808 irssi_0.8.20-2.debian.tar.xz
>  ea502f720f265862e4205e6d68a427dc9a469f2de1ac03d573bea786cbe881e0 2926256 irssi-dbgsym_0.8.20-2_amd64.deb
>  90785529dd1becf16c5b537ffff4632bdc0a9a0668ecba1b7b5727176650fadc 423014 irssi-dev_0.8.20-2_amd64.deb
>  d161dab036c50f0f3f5b01b3ab7a887269b6fdcd149c00ad7b6f9f3756cc85f4 1038988 irssi_0.8.20-2_amd64.deb
> Files:
>  c97743eabb40965e2c02cc188129bde6 1903 net optional irssi_0.8.20-2.dsc
>  71c2e999fbcbce3b8b8218ebfb652a0a 19808 net optional irssi_0.8.20-2.debian.tar.xz
>  aef50ad6a29457171d16bdc66e85e0e7 2926256 debug extra irssi-dbgsym_0.8.20-2_amd64.deb
>  e88f45a5a8519880519c476c9f597a29 423014 net extra irssi-dev_0.8.20-2_amd64.deb
>  256a120a310d0dc4b630e5e8cb936aa3 1038988 net optional irssi_0.8.20-2_amd64.deb
> 
 

-- 
cheers,
	Holger
[signature.asc (application/pgp-signature, inline)]

Reply sent to Rhonda D'Vine <rhonda@deb.at>:
You have taken responsibility. (Sat, 24 Sep 2016 17:21:03 GMT) (full text, mbox, link).


Notification sent to Holger Levsen <holger@layer-acht.org>:
Bug acknowledged by developer. (Sat, 24 Sep 2016 17:21:03 GMT) (full text, mbox, link).


Message #26 received at 838762-done@bugs.debian.org (full text, mbox, reply):

From: Rhonda D'Vine <rhonda@deb.at>
To: 838762-done@bugs.debian.org
Subject: fixed in 0.8.20-2
Date: Sat, 24 Sep 2016 19:19:16 +0200
Version: 0.8.20-2

     Hi,

 forgot to add the closes to the changelog:

  * New patch 23fix-buf.pl to fix an information exposure issue involved
    with using buf.pl and /upgrade.

 Thanks,
Rhonda
-- 
Fühlst du dich mutlos, fass endlich Mut, los      |
Fühlst du dich hilflos, geh raus und hilf, los    | Wir sind Helden
Fühlst du dich machtlos, geh raus und mach, los   | 23.55: Alles auf Anfang
Fühlst du dich haltlos, such Halt und lass los    |



Marked as found in versions irssi/0.8.15-5. Request was from Rhonda D'Vine <rhonda@debian.org> to control@bugs.debian.org. (Sat, 24 Sep 2016 17:33:03 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Rhonda D'Vine <rhonda@debian.org>:
Bug#838762; Package irssi. (Mon, 26 Sep 2016 05:51:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Rhonda D'Vine <rhonda@debian.org>. (Mon, 26 Sep 2016 05:51:03 GMT) (full text, mbox, link).


Message #33 received at 838762@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Holger Levsen <holger@layer-acht.org>, 838762@bugs.debian.org
Subject: Re: Bug#838762: irssi: information disclosure vulnerabilit in buf.pl (CWE-732, CWE-538)
Date: Mon, 26 Sep 2016 07:48:37 +0200
Control: retitle -1 irssi: CVE-2016-7553: information disclosure vulnerability in buf.pl

This issue got assigend CVE-2016-7553 in
http://www.openwall.com/lists/oss-security/2016/09/26/4

Regards,
Salvatore



Changed Bug title to 'irssi: CVE-2016-7553: information disclosure vulnerability in buf.pl' from 'irssi: information disclosure vulnerability in buf.pl (CWE-732, CWE-538)'. Request was from Salvatore Bonaccorso <carnil@debian.org> to 838762-submit@bugs.debian.org. (Mon, 26 Sep 2016 05:51:03 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Fri, 28 Oct 2016 07:30:20 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 15:54:30 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.