Bug 243719 (CVE-2007-3099, CVE-2007-3100)

Summary: CVE-2007-3099 dos flaws in open-iscsi (CVE-2007-3100)
Product: [Other] Security Response Reporter: Mark J. Cox <mjc>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: mchristi
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-01-15 16:56:22 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 243726, 243727    
Bug Blocks:    
Attachments:
Description Flags
cve-2007-3099 patch
none
cve-2007-3100 patch none

Comment 1 Mark J. Cox 2007-06-11 14:59:26 UTC
Olaf Kirch from Oracle found two issues in open-iscsi

 1)     iscsid provides a management interface using an AF_LOCAL
        socket. To prevent unauthorized users from messing with it, it
        checks for the client's uid by doing a getsockopt(SO_PEERCRED).

        Unfortunately, it performs this operation on the *listening* socket,
        rather than the newly accepted connection. This will always return
        a uid of 0, effectively allowing everyone to perform management
        operations on the iSCSI initiator.

        It currently appears as if the impact is limited to DoS, as there's
        no obvious way for an attacker to retrieve eg passwords, or
        gain privilege. There's a whole lot of code though, so maybe
        there's a buffer overflow lurking somewhere that can be exploited.

        However, at a minimum this allows an attacker to shoot down iscsid,
        or tear down individual iSCSI connections.

        CVE-2007-3099

 2)     iscsid uses a rather fanciful logging mechanism, where
        the main process logs to a shared memory area, from
        where a child process picks up the messages and feeds
        them to syslog. This is protected by a semaphore created
        with mode 0666. This allows anyone to up the semaphore.
        iscsid will block on the next attempt to log something, and
        hang indefinitely.

        CVE-2007-3100

Should be public later today, marking as embargoed for now.

Comment 2 Mark J. Cox 2007-06-11 15:03:43 UTC
Created attachment 156720 [details]
cve-2007-3099 patch

Comment 3 Mark J. Cox 2007-06-11 15:04:01 UTC
Created attachment 156721 [details]
cve-2007-3100 patch

Comment 4 Mark J. Cox 2007-06-11 21:10:12 UTC
now public, removing embargo

Comment 6 Red Hat Product Security 2008-01-15 16:56:22 UTC
This issue was addressed in:

Red Hat Enterprise Linux:
  http://rhn.redhat.com/errata/RHSA-2007-0497.html

Fedora:
  https://admin.fedoraproject.org/updates/F7/FEDORA-2007-0543