Bug 1110179

Summary: iodine: authentication bypass fixed in version 0.7.0
Product: [Other] Security Response Reporter: Murray McAllister <mmcallis>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED DUPLICATE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: carnil, lystor, pahan, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: iodine 0.7.0 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-06-18 04:57:05 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1110181, 1110182, 1110338, 1110339    
Bug Blocks:    

Description Murray McAllister 2014-06-17 07:55:40 UTC
iodine is used for tunneling IPv4 data through a DNS server. It was reported that the 0.7.0 release fixes an authentication bypass. Quoting the upstream commit message:

""
The client could bypass the password check by continuing after getting error
from the server and guessing the network parameters. The server would still
accept the rest of the setup and also network traffic.

Add checks for normal and raw mode that user has authenticated before allowing
any other communication.

Problem found by Oscar Reparaz.
""

Upstream commit:

https://github.com/yarrick/iodine/commit/b715be5cf3978fbe589b03b09c9398d0d791f850

CVE request:

http://seclists.org/oss-sec/2014/q2/543

Comment 1 Murray McAllister 2014-06-17 07:56:46 UTC
Created iodine tracking bugs for this issue:

Affects: fedora-all [bug 1110181]
Affects: epel-all [bug 1110182]

Comment 2 Murray McAllister 2014-06-18 04:57:05 UTC

*** This bug has been marked as a duplicate of bug 1110338 ***