The big new this week is SackPANIC! updates for the Linux kernel, plus we look at vulnerabilities in, and updates for, Samba, SQLite, Bind, Thunderbird and more, and we are hiring!
Show Notes
Overview
The big new this week is SackPANIC! updates for the Linux kernel, plus we look at vulnerabilities in, and updates for, Samba, SQLite, Bind, Thunderbird and more, and we are hiring!
Mix of various issues, most involving various memory corruption problems
UAFs, DoS (crash), heap-based buffer over-reads (crash -> DoS or
possible information disclosure), incorrect use of temporary
directories, race-condition leading to NULL pointer dereference,
integer overflow -> buffer overflow -> crash / code execution
DoS where some APIs in the guest agents could be accessed by read-only
users - this would cause libvirt to block and cause a DoS
Privilege escalation due to insecure permissions on the virt-lockd and
virt-logd UNIX domain sockets - these are created by systemd unit files
but were created as world writable - and the daemons don’t try and
authenticate the user - so anyone could use these sockets to potentially
elevate privileges - so fixed by ensuring the systemd socket definitions
specify the right mode.
Firefox 67.0.3 which fixes a remotely exploitable crash or possible code
execution problem due to type confusion in the Javascript engine -
reports this was used to target various cryptocurrency exchanges by
delivering Windows and Mac malware to them
Updated the AppArmor profile for evince to ensure it restricts access to
various private file directories, and to address various issues raised by
Jann Horn of GPZ - in particular limiting access to various DBus services
“Stack buffer overflow by setting a password” - authenticated user could
set their password to a specially constructed value which when processed
by PostgreSQL would cause it to crash, or possible execute arbitrary code
in the context of the PostgreSQL server
Remotely triggerable memory leak (by unauthenticated users) could be used
to crash the Mosquitto Broker -> DoS
Different DoS where one client could cause others to be disconnected by
sending invalid an UTF-8 topic string - which would cause other clients
which do reject invalid UTF-8 to disconnect themselves
Episode 32 covered most recent Intel CPU vulnerabilities (MDS) -
mitigated by a combination of microcode and kernel updates - this
provides microcode updates for the Sandy Bridge family of Intel
processors
Possible RCE (was serializing encryption key info into a session
cookie) which could then be read by an attacker since it also made
session cookie accessible via an API endpoint
Sample web application used a hard-coded encryption key which could
also allow attackers to do RCE as they could easily interpose on the
session
Environment variables were exposed by an example API endpoint which
exposed host info and so remote attackers could then possibly gain
admin access
Lacked brute-force password protection as wouldn’t reject already
denied hosts from repeatedly trying
Goings on in Ubuntu Security Community
Alex and Joe talk about the SACK Panic issues discovered by Netflix