Bug 835849 (CVE-2012-3368) - CVE-2012-3368 dtach: Memory portion (random stack data) disclosure to the client by unclean client disconnect
Summary: CVE-2012-3368 dtach: Memory portion (random stack data) disclosure to the cli...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2012-3368
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 812551 812552 835853
Blocks: 835855
TreeView+ depends on / blocked
 
Reported: 2012-06-27 09:52 UTC by Jan Lieskovsky
Modified: 2021-06-11 21:04 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-06-11 21:04:35 UTC
Embargoed:


Attachments (Terms of Use)
Preliminary dtach patch, provided to SF upstream ticket (1.16 KB, patch)
2012-06-27 10:01 UTC, Jan Lieskovsky
no flags Details | Diff

Description Jan Lieskovsky 2012-06-27 09:52:56 UTC
A portion of memory (random stack data) disclosure flaw was found in the way dtach, a simple program emulating the detach feature of screen, performed client connection termination under certain circumstances. A remote attacker could use this flaw to potentially obtain sensitive information by issuing a specially-crafted dtach client connection close request.

Upstream ticket:
[1] http://sourceforge.net/tracker/?func=detail&aid=3517812&group_id=36489&atid=417357

Preliminary proposed patch:
[2] http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812

References:
[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625302
[4] https://bugzilla.redhat.com/show_bug.cgi?id=812551

Comment 1 Jan Lieskovsky 2012-06-27 09:55:08 UTC
This issue affects the versions of the dtach package, as shipped with Red Hat Enterprise Linux 5 and 6.

--

This issue affects the versions of the dtach package, as shipped with Fedora release of 16 and 17. Please schedule an update (once there is final upstream patch available).

Comment 2 Jan Lieskovsky 2012-06-27 09:59:35 UTC
CVE Request:
[5] http://www.openwall.com/lists/oss-security/2012/06/27/3

Comment 3 Jan Lieskovsky 2012-06-27 10:01:05 UTC
Created attachment 594740 [details]
Preliminary dtach patch, provided to SF upstream ticket

Comment 4 Jan Lieskovsky 2012-06-27 10:03:20 UTC
Created dtach tracking bugs for this issue

Affects: fedora-all [bug 835853]

Comment 5 Huzaifa S. Sidhpurwala 2012-06-29 03:26:08 UTC
CVE-2012-3368 has been assigned to this issue, as per:
http://www.openwall.com/lists/oss-security/2012/06/29/1

Comment 9 Fedora Update System 2013-03-04 22:23:59 UTC
dtach-0.8-8.fc18 has been pushed to the Fedora 18 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 10 Product Security DevOps Team 2021-06-11 21:04:35 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2012-3368


Note You need to log in before you can comment on or make changes to this bug.