Bug 835849 (CVE-2012-3368)

Summary: CVE-2012-3368 dtach: Memory portion (random stack data) disclosure to the client by unclean client disconnect
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: lhh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-06-11 21:04:35 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 812551, 812552, 835853    
Bug Blocks: 835855    
Attachments:
Description Flags
Preliminary dtach patch, provided to SF upstream ticket none

Description Jan Lieskovsky 2012-06-27 09:52:56 UTC
A portion of memory (random stack data) disclosure flaw was found in the way dtach, a simple program emulating the detach feature of screen, performed client connection termination under certain circumstances. A remote attacker could use this flaw to potentially obtain sensitive information by issuing a specially-crafted dtach client connection close request.

Upstream ticket:
[1] http://sourceforge.net/tracker/?func=detail&aid=3517812&group_id=36489&atid=417357

Preliminary proposed patch:
[2] http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812

References:
[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625302
[4] https://bugzilla.redhat.com/show_bug.cgi?id=812551

Comment 1 Jan Lieskovsky 2012-06-27 09:55:08 UTC
This issue affects the versions of the dtach package, as shipped with Red Hat Enterprise Linux 5 and 6.

--

This issue affects the versions of the dtach package, as shipped with Fedora release of 16 and 17. Please schedule an update (once there is final upstream patch available).

Comment 2 Jan Lieskovsky 2012-06-27 09:59:35 UTC
CVE Request:
[5] http://www.openwall.com/lists/oss-security/2012/06/27/3

Comment 3 Jan Lieskovsky 2012-06-27 10:01:05 UTC
Created attachment 594740 [details]
Preliminary dtach patch, provided to SF upstream ticket

Comment 4 Jan Lieskovsky 2012-06-27 10:03:20 UTC
Created dtach tracking bugs for this issue

Affects: fedora-all [bug 835853]

Comment 5 Huzaifa S. Sidhpurwala 2012-06-29 03:26:08 UTC
CVE-2012-3368 has been assigned to this issue, as per:
http://www.openwall.com/lists/oss-security/2012/06/29/1

Comment 9 Fedora Update System 2013-03-04 22:23:59 UTC
dtach-0.8-8.fc18 has been pushed to the Fedora 18 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 10 Product Security DevOps Team 2021-06-11 21:04:35 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2012-3368