[Bug 408352] New: potential time shift vulnerability in Online Update
https://bugzilla.novell.com/show_bug.cgi?id=408352 Summary: potential time shift vulnerability in Online Update Product: openSUSE 11.0 Version: Final Platform: Other OS/Version: Other Status: NEW Severity: Minor Priority: P5 - None Component: Security AssignedTo: security-team@suse.de ReportedBy: sbrabec@novell.com QAContact: qa@suse.de CC: zypp-maintainers@forge.provo.novell.com Found By: --- I found following theoretical problem in the Online Update work-flow. I did not verify, that the problem is real and whether it can be exploited. Suppose that malicious person takes control over one of online update mirrors and wants to provide vulnerable software. It is not possible to do it directly, as all online updates are signed. But following scenario may be possible: 1. Instead of mirroring from the official servers, it will only back-up the original unline update contents. 2. Provide data from the back-up to the mirror and increase time shift over the time. Server is up, provides correctly signed packages, time new security update appears. User has no doubt. 3. Log IP addresses of machines checking for online update. This scenario could provide vulnerability window created by the time shift and list of IP addresses of still vulnerable machines. Malicious person has enough time to create an exploit and install it to vulnerable machines. Proposed fix: Verify time stamp of update server. If unusual time shift is detected, display a warning. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=408352 User mls@novell.com added comment https://bugzilla.novell.com/show_bug.cgi?id=408352#c1 --- Comment #1 from Michael Schröder <mls@novell.com> 2008-07-11 07:17:02 MDT --- You mean found as in "found in slashdot"? See http://it.slashdot.org/it/08/07/10/227220.shtml. Anyways, this vulnerability does not exist for opensuse as long as our redirector is used. This is because the repository metadata doesn't get redirected to the mirrors, so we do not have problems with outdated/maliciously modified mirrors. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=408352 User lnussel@novell.com added comment https://bugzilla.novell.com/show_bug.cgi?id=408352#c2 --- Comment #2 from Ludwig Nussel <lnussel@novell.com> 2008-07-11 07:19:00 MDT --- ok to close bug? -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=408352 User mls@novell.com added comment https://bugzilla.novell.com/show_bug.cgi?id=408352#c3 --- Comment #3 from Michael Schröder <mls@novell.com> 2008-07-11 07:22:15 MDT --- Dunno, the article itself is currently slashdotted, maybe the authors found some other vulnerabilities. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=408352 User meissner@novell.com added comment https://bugzilla.novell.com/show_bug.cgi?id=408352#c4 --- Comment #4 from Marcus Meissner <meissner@novell.com> 2008-07-11 08:41:14 MDT --- you can only stop updates from getting delivered at least, by presenting old data. due to >= requirements the package manager will never downgrade automaitcally. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
https://bugzilla.novell.com/show_bug.cgi?id=408352 User lnussel@novell.com added comment https://bugzilla.novell.com/show_bug.cgi?id=408352#c5 Ludwig Nussel <lnussel@novell.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |FIXED --- Comment #5 from Ludwig Nussel <lnussel@novell.com> 2009-03-19 04:13:13 MST --- Meta data now supports an expire tag so an attacker cannot withhold updates forever: http://en.opensuse.org/Standards/Rpm_Metadata#Outdated_Metadata_Hint -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com