Bugzilla – Bug 55559
VUL-0: CVE-2003-0461: kernel: side-channel attack through /proc/tty/driver/serial
Last modified: 2021-10-04 08:48:45 UTC
Hello, to make it official and trackable. > CAN-2003-0461 - Informationen aus /proc/tty/driver/serial > > Aus /proc/tty/driver/serial kann die Anzahl der eingegebenen Zeichen > abgelesen werden. Lokale Angreifer koennen diese Information dazu > benutzen, die Laenge des Passworts und die Zeitabstaende zwischen > einzelnen Zeichen bei der Eingabe von Passworten zu bestimmen. Dies > erleichtert das Raten des Passworts.
<!-- SBZ_reproduce --> -
Solution would be to make this file 0600?
If it doesn't break anything.. yes.
If some attacker counts the characters that go over the serial line: How does he know that someone typed a password and not simply some command? How does the attacker know that it is the administrator sitting before the machine? How can the attacker be sure the administrator is not typing some email but the root password of the machine? Of course I will happily set the mode of /proc/.../serial to mode 600. But be sure that every single bugreport caused by this change will be assigned to the security people. I cannot believe that you are seriously saying this is a "vulnerability". Btw, since all other distributions are immune against this incredibly severe problem: Which fix did they use in order to save the world?
I think we should not waste our time on this report. If you want to fix this problem properly, you would have to change the permissions on /proc/interrupts as well, and possibly some /sys files too. While we're at it, we should probably disable the stat64 system call as well, because it lets you retrieve the mtime of any pty at nanosecond granularity, which is even better than just counting the number of keystrokes (because the delay between two key strokes gives you additional clues about what is being typed).
Yes, right. We should change this too. :)
The immense danger does not justify any kernel change.
CVE-2003-0461: CVSS v2 Base Score: 2.1 (AV:L/AC:L/Au:N/C:P/I:N/A:N)