[Secure-testing-team] Bug#647205: cherokee: Admin password generation uses time and PID, allows attackers to brute-force it
Gunnar Wolf
gwolf at gwolf.org
Mon Oct 31 16:28:36 UTC 2011
Package: cherokee
Version: 1.2.100-1
Severity: grave
Tags: security
Justification: user security hole
CVE issue CVE-2011-2190 points out that the temporary admin password
generation function is seeded by the time and PID, which allows an
attacker to brute-force it. Yes, in production systems cherokee-admin
should be quite short-lived, but administrators can leave it running
for long periods, opening a window to this attack.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2190
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2190
An example attack has been posted to the RedHat bugzilla:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2190
This bug has been filed in the upstream bugtracker:
http://code.google.com/p/cherokee/issues/detail?id=1295
-- System Information:
Debian Release: wheezy/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 3.0.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages cherokee depends on:
ii libc6 2.13-21
ii libcherokee-base0 1.2.100-1
ii libcherokee-server0 1.2.100-1
ii libssl1.0.0 1.0.0e-2
ii logrotate 3.7.8-6
Versions of packages cherokee recommends:
ii cherokee-admin 1.2.100-1
ii spawn-fcgi 1.6.3-1
Versions of packages cherokee suggests:
ii cherokee-doc 1.2.100-1
ii libcherokee-mod-geoip 1.2.100-1
ii libcherokee-mod-ldap 1.2.100-1
ii libcherokee-mod-libssl 1.2.100-1
ii libcherokee-mod-mysql 1.2.100-1
ii libcherokee-mod-rrd 1.2.100-1
ii libcherokee-mod-streaming 1.2.100-1
-- Configuration Files:
/etc/cherokee/cherokee.conf changed [not included]
-- debconf-show failed
More information about the Secure-testing-team
mailing list