Your message dated Thu, 29 Sep 2016 13:04:39 +0000
with message-id <e1bpb0x-00060p...@franck.debian.org>
and subject line Bug#775360: fixed in p0f 3.09b-1
has caused the Debian Bug report #775360,
regarding Trivial DoS attack vector against p0f service
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
775360: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775360
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: p0f
Version: 3.06b-2
Severity: grave
Tags: security

Sending "malformed" (or legacy format(!!?)) packets to p0f's socket results in 
a crash of the service:

[+] Closed 1 file descriptor.
[+] Loaded 314 signatures from '/etc/p0f/p0f.fp'.
[+] Intercepting traffic on default interface 'eth0'.
[+] Custom filtering rule enabled: dst port 25 [+VLAN]
[+] Listening on API socket '/var/run/dc-p0f.socket' (max 20 clients).
[+] Privileges dropped: uid 112, gid 114, root '/var/spool/qpsmtpd'.
[+] Entered main event loop.

[-] SYSTEM ERROR : read() on API socket fails despite POLLIN.
        Location : live_event_loop(), p0f.c:916
      OS message : Connection reset by peer


This issue is discussed, from another angle, on the milter mailing list here: 
http://comments.gmane.org/gmane.mail.sendmail.milter.greylist/3184

This bug is not about getting milter (or any other p0f client) to work, but 
rather about the fact that it is so trivial to launch a DoS attack against p0f.

Any attacker with access to p0f's socket has the ability to crash the service.  
p0f should rather accept the bogus input and behave properly (issue an error, 
disconnect, etc). ? Testing suggests that this issue is likely resolved in 
later versions of the upstream package.

--- End Message ---
--- Begin Message ---
Source: p0f
Source-Version: 3.09b-1

We believe that the bug you reported is fixed in the latest version of
p0f, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 775...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sophie Brun <sop...@freexian.com> (supplier of updated p0f package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 29 Sep 2016 14:54:30 +0200
Source: p0f
Binary: p0f
Architecture: source
Version: 3.09b-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools Packaging Team 
<pkg-security-t...@lists.alioth.debian.org>
Changed-By: Sophie Brun <sop...@freexian.com>
Description:
 p0f        - Passive OS fingerprinting tool
Closes: 775360 777179 831498
Changes:
 p0f (3.09b-1) unstable; urgency=medium
 .
   [ Sophie Brun ]
   * Import new upstream release 3.09b (Closes: #831498)
     - Version 3.07 fixed dropped some fatal errors (Closes: #775360)
   * Take over the package in the pkg-security team with the permission of
     Pierre Chifflier. Keep him in the Uploaders.
   * Update debian/copyright
   * Update manpage
   * Add a debian/watch
   * Fix the lintian warning: hardening-no-bindnow
   * Upgrade the rules file to use dh (Closes: #777179)
 .
   [ Raphaƫl Hertzog ]
   * Bump Standards-Version to 3.9.8.
Checksums-Sha1:
 3f8cec72c4d64cae92c1fff3d0fcead9063380f1 1582 p0f_3.09b-1.dsc
 4a24b96b200fdc08b136bb48b58a7389c99d5587 92896 p0f_3.09b.orig.tar.gz
 8f2aeabd1b579a13d819665dee3247664fc5a196 6384 p0f_3.09b-1.debian.tar.xz
Checksums-Sha256:
 2092bfba3af5f84296408dab599ec9c8e7a91f30918c1c3f0420a6b49e84b50c 1582 
p0f_3.09b-1.dsc
 543b68638e739be5c3e818c3958c3b124ac0ccb8be62ba274b4241dbdec00e7f 92896 
p0f_3.09b.orig.tar.gz
 fb9f605ed767689f97008d6eb92f02f1c0b4a5d2a69dcf2c6d38474c76ff4b1b 6384 
p0f_3.09b-1.debian.tar.xz
Files:
 424035891eb7b7663025c3cb6cdfa677 1582 net extra p0f_3.09b-1.dsc
 bc863233dc2b440cae6ef5665cae34bb 92896 net extra p0f_3.09b.orig.tar.gz
 f63a9e11a5a94e99d1c6f2745fc81d58 6384 net extra p0f_3.09b-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Comment: Signed by Raphael Hertzog

iQEcBAEBCgAGBQJX7Q96AAoJEAOIHavrwpq5iAAH/jj0A6NYhZGr5JSxkFwLihz3
KRoetKR4gjdULbnPwL9DZ/4lTt+E7y9np8+79DdcsCwn85PUNbKQeKbaaDiNK5HE
nuvO1VmsFgeWuKFaviidQkpqHzkVYcFwaqoJVNtZg4QE3tVPcoi43lR54vn4kzFM
9GxSrX03yvZq3vnS+Mu9nJNVs7fbKq40CtmLDbKx/Qum5v196Jjg3FWPq5X3nxdQ
HrvLwI3GDktPnjuR+Ljfxarwt7DPyJcTEpYiHqY5rSXJMyBPAjJniDLHALaYUp/D
4c7AFCfaJ7/wB2OY7XCBrLZK3fPR2IQ66sSox294tnVKGkCH1G7zK/WUfLXOoLs=
=Jox0
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to