[Secure-testing-team] Bug#709552: libsasl2-2: Insecure mechanisms are prefered while more secure mechanisms are available

Thijs Alkemade me at thijsalkema.de
Thu May 23 23:54:09 UTC 2013


Package: libsasl2-2
Version: 2.1.25.dfsg1-6
Severity: important
Tags: security upstream

Some SASL implementations allow the server to specify a list of mechanisms
it supports. The client should then pick the strongest mechanism it supports
to authenticate. For example, when PLAIN and SCRAM-SHA-1 are available, it
should use SCRAM-SHA-1, as it is in many ways more secure than PLAIN.

A bug in Cyrus-SASL 2.1.24 and up causes PLAIN to be chosen over SCRAM-SHA-1
when the server ordered PLAIN before SCRAM-SHA-1 (the order in which the
server specifies the mechanisms should be ignored by the client).

This can cause a client using Cyrus-SASL to disclose its password in plain,
while it doesn't need to. Here is an example of it happening in Pidgin,
compiled with Cyrus-support:

(01:39:37) jabber: Recv (ssl)(497): <?xml version='1.0'?><stream:stream xmlns:stream='http://etherx.jabber.org/streams' version='1.0' from='xnyhps.nl' id='9531b529-e769-4c00-a17f-fae4221436da' xml:lang='en' xmlns='jabber:client'><stream:features><register xmlns='http://jabber.org/features/iq-register'/><auth xmlns='http://jabber.org/features/iq-auth'/><mechanisms xmlns='urn:ietf:params:xml:ns:xmpp-sasl'><mechanism>PLAIN</mechanism><mechanism>SCRAM-SHA-1</mechanism><mechanism>DIGEST-MD5</mechanism></mechanisms></stream:features>
(01:39:37) sasl: Mechs found: PLAIN SCRAM-SHA-1 DIGEST-MD5
(01:39:37) sasl: No worthy mechs found
(01:39:41) sasl: Mechs found: PLAIN SCRAM-SHA-1 DIGEST-MD5
(01:39:41) jabber: Sending (ssl) (test at xnyhps.nl): <auth xmlns='urn:ietf:params:xml:ns:xmpp-sasl' mechanism='PLAIN' xmlns:ga='http://www.google.com/talk/protocol/auth' ga:client-uses-full-bind-result='true'>password removed</auth>
(01:39:41) jabber: Recv (ssl)(60): <success xmlns='urn:ietf:params:xml:ns:xmpp-sasl'></success>

This issue was reported upstream at https://bugzilla.cyrusimap.org/show_bug.cgi?id=3793.
However, it has received no response. I'm also reporting it here because
I think it's a security issue that puts Debian users at risk.


-- System Information:
Debian Release: 7.0
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libsasl2-2 depends on:
ii  libc6              2.13-38
ii  libdb5.1           5.1.29-5
ii  multiarch-support  2.13-38

Versions of packages libsasl2-2 recommends:
ii  libsasl2-modules  2.1.25.dfsg1-6

libsasl2-2 suggests no packages.

-- no debconf information



More information about the Secure-testing-team mailing list