Bug 964299 (CVE-2013-2069) - CVE-2013-2069 livecd-tools: improper handling of passwords
Summary: CVE-2013-2069 livecd-tools: improper handling of passwords
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2013-2069
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
: 961166 (view as bug list)
Depends On: 961170 961171 961174 961175 961644 962493 963100 963101 964186 966594 966596
Blocks: 961166 961176
TreeView+ depends on / blocked
 
Reported: 2013-05-17 19:04 UTC by Kurt Seifried
Modified: 2023-05-11 22:53 UTC (History)
16 users (show)

Fixed In Version: livecd-tools 19.3, livecd-tools 18.16, livecd-tools 17.17, livecd-tools 13.4.4
Doc Type: Bug Fix
Doc Text:
It was discovered that when used to create images, livecd-tools gave the root user an empty password rather than leaving the password locked in situations where no 'rootpw' directive was used or when the 'rootpw --lock' directive was used within the Kickstart file, which could allow local users to gain access to the root account.
Clone Of:
Environment:
Last Closed: 2021-10-20 10:39:24 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Bugzilla 968915 0 unspecified CLOSED Anaconda locks user account instead of creating it password-less 2021-02-22 00:41:40 UTC
Red Hat Product Errata RHSA-2013:0849 0 normal SHIPPED_LIVE Important: KVM image security update 2013-05-23 18:34:58 UTC

Internal Links: 968915

Description Kurt Seifried 2013-05-17 19:04:02 UTC
The livecd-tools package provides support for reading and executing
Kickstart files in order to create a system image. It was discovered
that livecd-tools gave the root user an empty password rather than
leaving the password locked in situations where no 'rootpw' directive
was used or when the 'rootpw --lock' directive was used within the
Kickstart file, which could allow local users to gain access to the
root account. (CVE-2013-2069)

Please note that livecd-tools is also used by appliance-tools to create
images used for virtual machines, USB based systems, and so on.
Additionally, the Python script components of livecd-tools have been
broken out into a separate package named python-imgcreate on some
distributions (such as Fedora).

Acknowledgements:

Red Hat would like to thank Amazon Web Services for reporting this issue. 
Amazon Web Services acknowledges Sylvain Beucler as the original reporter.

Comment 2 Mark J. Cox 2013-05-23 09:07:12 UTC
IssueDescription:

It was discovered that when used to create images, livecd-tools gave the root user an empty password rather than leaving the password locked in situations where no 'rootpw' directive was used or when the 'rootpw --lock' directive was used within the Kickstart file, which could allow local users to gain access to the root account.

ExternalReferences:

https://access.redhat.com/site/solutions/379353

Comment 3 errata-xmlrpc 2013-05-23 13:36:41 UTC
This issue has been addressed in following products:

  Red Hat Common

Via RHSA-2013:0849 https://rhn.redhat.com/errata/RHSA-2013-0849.html

Comment 4 Tomas Hoger 2013-05-23 14:20:51 UTC
Created livecd-tools tracking bugs for this issue

Affects: fedora-all [bug 966594]
Affects: epel-all [bug 966596]

Comment 6 Arkady L. Shane 2013-05-24 15:05:39 UTC
On LIVE Image builded with livecd-tools 19.3 is unable to login as root and/or run LIVEINST now.

Comment 7 Brian Lane 2013-05-24 16:14:23 UTC
(In reply to Arkady L. Shane from comment #6)
> On LIVE Image builded with livecd-tools 19.3 is unable to login as root
> and/or run LIVEINST now.

Correct. The live kickstarts need to be modified to remove the root password. I've sent a patch for that to the spin-kickstarts list. Also, this bug is not the right place for bugs in spins. Please file a new bug against spin-kickstarts.

Comment 8 Manfred Blankenfeld 2013-05-25 15:00:43 UTC
(In reply to Brian C. Lane from comment #7)
> (In reply to Arkady L. Shane from comment #6)
> > On LIVE Image builded with livecd-tools 19.3 is unable to login as root
> > and/or run LIVEINST now.
> 
> Correct. The live kickstarts need to be modified to remove the root
> password. I've sent a patch for that to the spin-kickstarts list. Also, this
> bug is not the right place for bugs in spins. Please file a new bug against
> spin-kickstarts.

trick: open a console and write
sudo passwd root

After given passwd you can start
liveinst.

Manfred

Comment 9 Adam Williamson 2013-05-27 22:36:08 UTC
I have applied (well, it didn't apply cleanly any more so I just re-did it) bcl's submitted patch for fedora-live-base.ks that does 'passwd -d root' so the root account is once more accessible without a password on the Fedora live images, as is intended to be the case. If someone considers this to be problem, please speak up :)

This change should only affect images that are built with the fedora-live-base.ks kickstart included, so if the 'appliance' images where this behaviour is not desired are not based off that kickstart, things should be fine. If they *are* based off that kickstart, we may need to split things out some more.

Comment 11 Tomas Hoger 2013-05-28 09:34:06 UTC
Cloud images should be using kickstarts from cloud-kickstarts git repo, see comment #5.

Comment 12 Matthew Miller 2013-05-29 02:20:09 UTC
Current cloud image kickstarts both specify rootpw --lock and call passwd -l root in %post for good measure. In the primary "-cloud" kickstart file, the assumption is that you will provide an SSH key via your cloud provider's metadata service, and this is injected into the system on boot.

Comment 14 Fedora Update System 2013-06-11 09:18:14 UTC
livecd-tools-17.17-1.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 15 Fedora Update System 2013-06-12 03:33:06 UTC
livecd-tools-19.4-1.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 16 Kurt Seifried 2015-02-05 00:18:20 UTC
*** Bug 961166 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.