Your message dated Fri, 16 Oct 2009 04:17:48 +0000
with message-id <e1myegc-0005cz...@ries.debian.org>
and subject line Bug#529306: fixed in slim 1.3.1-2
has caused the Debian Bug report #529306,
regarding slim: insecure xauth secret
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
529306: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529306
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: slim
Version: 1.3.0-2
Severity: grave
Tags: security

Hi,
>From app.cpp:
1134 void App::CreateServerAuth() {
1135     /* create mit cookie */
1136     int i, r;
1137     int hexcount = 0;
1138         string authfile;
1139     string cmd;
1140     char *digits = "0123456789abcdef";
1141         srand( time(NULL) );
1142     for ( i = 0; i < 31; i++ ) {
1143         r = rand()%16;
1144                 mcookie[i] = digits[r];
1145                 if (r>9)
1146                         hexcount++;
1147     }
1148         /* MIT-COOKIE: even occurrences of digits and hex digits */
1149         if ((hexcount%2) == 0) {
1150                 r = rand()%10;
1151         } else {
1152                 r = rand()%5+10;
1153         }
1154         mcookie[31] = digits[r];
1155     /* reinitialize auth file */
1156     authfile = cfg->getOption("authfile");
1157     remove(authfile.c_str());
1158     putenv(StrConcat("XAUTHORITY=", authfile.c_str()));
1159     cmd = cfg->getOption("xauth_path") + " -q -f " + authfile + " add :0 . 
" + mcookie;
1160     system(cmd.c_str());
1161 }

This function is used to create the x authority file in /var/run which is
then copied into the users home directory on login. However this function 
somehow defeats the
purpose of xauth as the file itself is generated by executing xauth via system 
and includes
mcookie (the secret hex string) in the command line. So as an attacker I can 
watch the process
list, grab the mcookie string and generate my own x auth cookie to have fun 
with the victims
X session. The same problem exists in switchuser.cpp.

The easy fix would be to read this from stdin, xauth supports this. As small 
remark...
I think using the time as a source for random data is also suboptimal in this 
case.

Cheers
Nico



--- End Message ---
--- Begin Message ---
Source: slim
Source-Version: 1.3.1-2

We believe that the bug you reported is fixed in the latest version of
slim, which is due to be installed in the Debian FTP archive:

slim_1.3.1-2.diff.gz
  to pool/main/s/slim/slim_1.3.1-2.diff.gz
slim_1.3.1-2.dsc
  to pool/main/s/slim/slim_1.3.1-2.dsc
slim_1.3.1-2_i386.deb
  to pool/main/s/slim/slim_1.3.1-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 529...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nobuhiro Iwamatsu <iwama...@debian.org> (supplier of updated slim package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 21 Sep 2009 15:52:33 +0900
Source: slim
Binary: slim
Architecture: source i386
Version: 1.3.1-2
Distribution: unstable
Urgency: low
Maintainer: Nobuhiro Iwamatsu <iwama...@debian.org>
Changed-By: Nobuhiro Iwamatsu <iwama...@debian.org>
Description: 
 slim       - desktop-independent graphical login manager for X11
Closes: 505332 510469 529306 536542
Changes: 
 slim (1.3.1-2) unstable; urgency=low
 .
   * Add Jens Peter Secher to Uploaders list.
   * Update es.po (Closes: #510469)
   * Fix FTBFS with GCC 4.4. (Closes: #505332)
   * Fix insecure xauth secret. (Closes: #529306)
   * Fix allows login as root without password. (Closes: #536542)
      - Wrote explanation about this problem to README.Debian.
Checksums-Sha1: 
 5119604aacafbdaa7262c6354ea393c2ac9e0d74 1116 slim_1.3.1-2.dsc
 ed59be2979a66da6991f6845f5a3139428423ca3 661700 slim_1.3.1-2.diff.gz
 cd3bccc47f109c65e5b8332c968949be73328a45 817378 slim_1.3.1-2_i386.deb
Checksums-Sha256: 
 05bc56c6e0b8b1f7885528db5c95ce1eaf8a126a2d3ab64b82c0e0619124bf89 1116 
slim_1.3.1-2.dsc
 dec450826bf00393f7a4e5ddab0266c33bdec1b4340c886e1d6cd6b44d74d6a5 661700 
slim_1.3.1-2.diff.gz
 731d0ec9702594dd51154957b542a38896c4ee92cf36c8f98260751557b8edbf 817378 
slim_1.3.1-2_i386.deb
Files: 
 6a2e27f370abb242163e3c2b10ddc266 1116 x11 optional slim_1.3.1-2.dsc
 1feb39759d74b09e4823008f549573a6 661700 x11 optional slim_1.3.1-2.diff.gz
 38f1310801713ba27b9cf03dce0385ea 817378 x11 optional slim_1.3.1-2_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkrX7qUACgkQQSHHQzFw6+npRQCfeL+5qMhjIkD/J0lG0cNoLpzc
yDgAnigOADGH0YOhAkGVfylIGGcmWET8
=RjkV
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to