Bug 64545 (CVE-2004-2652) - VUL-0: CVE-2004-2652: snort: denial-of-service
Summary: VUL-0: CVE-2004-2652: snort: denial-of-service
Status: RESOLVED FIXED
Alias: CVE-2004-2652
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: All Linux
: P3 - Medium : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVE-2004-2652: CVSS v2 Base Score: 7....
Keywords:
Depends on: 76899
Blocks:
  Show dependency treegraph
 
Reported: 2004-12-30 23:31 UTC by Thomas Biege
Modified: 2021-10-27 15:39 UTC (History)
2 users (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Thomas Biege 2004-12-30 23:31:42 UTC
<!-- SBZ_reproduce  -->
http://www.k-otik.com/exploits/20041222.angelDust.c.php
Comment 2 Thomas Biege 2004-12-31 18:25:07 UTC
swamp id: 90 
 
Comment 3 Thomas Biege 2005-01-07 22:56:39 UTC
Will be handled by Klaus at 10th of Jan.. 
Comment 4 Klaus Singvogel 2005-01-17 23:01:50 UTC
I digged a bit deeper into this issue. 
 
This seems to be the root of all DOS reports: 
http://isc.sans.org/diary.php?date=2004-12-22 
 
Only if running in a special mode (= sniffer mode, or -v[erbose]), or FAST 
mode people are affected by this DoS. 
 
But just running in FAST mode and enabling snortdb, or running the even faster 
mode "barnyard" is enough not to be affected. So in most cases noone is 
harmed. ==> Adapting severity to minor. 
 
The problem is known and the patch was released 2004-10-04, but no special 
patch exists at the snort website. The Snort Team recommends to upgrade to 
latest version, which is a Release Candidate (2.3.0 RC2). 
 
As now a script exists for the kiddies, which hardens the conditions, I don't 
know what to do. 
- Should I reverse engineer the patch (amount of work time is unknown)? 
- Should I build snort-2.3.0RC2 for all old SUSE LINUX version? 
- Should I wait for snort-2.3.0 final? 
==> Input needed from security-team reassigning it. 
 
BTW: I didn't find any CAN number yet. 
Comment 5 Thomas Biege 2005-01-18 17:24:41 UTC
We should wait for the final version. 
 
Did we do version upgrades in the past? 
 
BTW, there is no CAN for snort in the Mitre database for year > 2003. 
 
 
Comment 6 Klaus Singvogel 2005-01-18 17:38:33 UTC
We didn't do many version upgrades for snort in the past. 
 
I can only remember of one upgrade, but can't remember when and for which 
distri this happened. 
Comment 7 Thomas Biege 2005-01-18 18:05:34 UTC
If you think extracting the patch is too much work, I would suggest a 
stable-only fix then. 
 
 
 
Comment 8 Thomas Biege 2005-02-09 06:42:47 UTC
Any news for us? :) 
 
Comment 9 Klaus Singvogel 2005-02-10 00:13:31 UTC
OOops. Forget that one. 
 
Nevertheless, a new version was released, as expected: 2.3.0 
 
Hopefully I can built and adapt it for old SuLi within this week. 
 
Thanks for reminding me. 
Comment 10 Marcus Meissner 2005-03-02 12:24:17 UTC
new swampid: 489 
Comment 11 Thomas Biege 2005-03-09 12:25:07 UTC
Klaus,
have you been successful?
Comment 12 Thomas Biege 2005-03-09 14:06:43 UTC
delayed for 9.3
Comment 13 Klaus Singvogel 2005-04-12 16:08:49 UTC
Where is a 8.1-i386 for testing? 
Comment 14 Thomas Biege 2005-04-12 16:16:13 UTC
8.1 died in the meantime... I think we can ignore it.
Comment 15 Klaus Singvogel 2005-04-12 16:26:11 UTC
Ok. Then I need a SLES8 (which is in gerneral equal to the 8.1 :) 
Comment 16 Thomas Biege 2005-04-13 04:21:58 UTC
At least the QA team should have one.
Comment 17 Klaus Singvogel 2005-04-18 17:43:03 UTC
I made now an update with a large patch for the old (free) ruleset: An  
adaption of the 2.3.0 ruleset (Feb) to current snort version 2.3.2  
  
new packages are submitted for: SLES8 (and derivats, like UL, SLEC), 8.2, 9.0,  
9.1 (and derivates like JDS, SLD, NLD, SLES9), 9.2, 9.3 
  
I think that this update is working, but Testing Team: please test a lot. :-) 
  
Security Team: reassigning this bug to handle rest of update process. 
 
Note: the question regarding the rulesets for upcoming versions is still 
undecided. For now I took an old rulesets (from Feb) only, I didn't wrote new 
rulesets to detect intrusion via latest security issues. 
Comment 18 Thomas Biege 2005-04-21 10:47:39 UTC
/work/src/done/PATCHINFO/snort.patch.maintained
/work/src/done/PATCHINFO/snort.patch.box
Comment 19 Heiko Rommel 2005-04-26 13:54:56 UTC
The update has been tested by QA for SLES8 and SLES9.
It is broken in multiple places. I see at least 3 problems:

snort wrong symlink to start script (SLES8)
-------------------------------------------
cancer:/var/log/snort/10.10.2.8 # rcsnort restart
-bash: /sbin/rcsnort: No such file or directory

cancer:/var/log/snort/10.10.2.8 # ll /usr/sbin/rcsnort
lrwxrwxrwx    1 root     root           23 Apr 26 15:08 /usr/sbin/rcsnort ->
../..//etc/init.d/snort


snort restart failes (SLES8)
----------------------------
how to reproduce
do a fresh install of snort (GA)
change /etc/sysconfig to reflect this changes:

SNORT_INTERFACE="eth0"
SNORT_ACTIVATE="yes"
SNORT_AUTO="yes"
SNORT_PROMISC="yes"
SNORT_USER="snort"
SNORT_GROUP="snort"
SNORT_EXTRA_OPTIONS="-v"

update snort using patch-10033

this is what happens:

cancer:/var/log/snort/10.10.2.8 # /etc/init.d/snort restart
Shutting down snort                                                            
          done
Starting snort                                                                 
          failed

from /var/log/messages:

Apr 26 15:09:27 cancer snort: Initializing daemon mode
Apr 26 15:09:27 cancer snort: PID path stat checked out ok, PID path set to
/var/run/
Apr 26 15:09:27 cancer snort: Writing PID "7923" to file "/var/run//snort_eth0.pid" 
Apr 26 15:09:27 cancer snort: Parsing Rules file /etc/snort/snort.conf 
Apr 26 15:09:27 cancer snort: FATAL ERROR:  unknown preprocessor "http_decode"
Apr 26 15:09:27 cancer kernel: device eth0 left promiscuous mode 


snort restart failes (SLES9)
----------------------------
how to reproduce
do a fresh install of snort (GA)
change /etc/sysconfig to reflect this changes:

SNORT_INTERFACE="eth0"
SNORT_ACTIVATE="yes"
SNORT_AUTO="yes"
SNORT_PROMISC="yes"
SNORT_USER="snort"
SNORT_GROUP="snort"
SNORT_EXTRA_OPTIONS="-v"

update snort using patch-10033

this is what happens:

gemini:~ # rcsnort restart
Shutting down snort                                                            
          done
Starting snort                                                                 
          done

gemini:~ # rcsnort status
                                                                               
          unused
from /var/log/messages:

Apr 26 15:21:48 gemini snort: FATAL ERROR: Unable to open rules file:
/etc/snort/local.rules or /etc/snort//etc/snort/local.rules

ok, trying to give /etc/snort/local.rules and starting things over:

gemini:~ # touch /etc/snort/local.rules
gemini:~ # rcsnort restart
Shutting down snort                                                            
          done
Starting snort                                                                 
          done

gemini:~ # rcsnort status
                                                                               
          unused

from /var/log/messages:

Apr 26 15:24:33 gemini snort: FATAL ERROR: Unable to open rules file:
/etc/snort/bad-traffic.rules or
 /etc/snort//etc/snort/bad-traffic.rules

Comment 20 Klaus Singvogel 2005-04-26 14:56:03 UTC
snort wrong symlink to start script (SLES8):  
--------------------------------------------  
Please check this again.  
In my specfile is a "ln -s ../../%{_sysconfdir}/init.d/snort rcsnort", which  
contradicts your examination.  
  
snort wrong symlink to start script (SLES8): 
-------------------------------------------- 
We must use /etc/snort/snort.conf.rpmnew to get "var 
RULE_PATH /etc/snort/rules" and are not allowed to use /etc/snort/snort.conf. 
Don't know how to solve this?! Help appreciate. 
 
==> no problems which I can fix. 
  
Will work on SLES9 issues... 
Comment 21 Klaus Singvogel 2005-04-26 14:57:40 UTC
SLES9: 
------ 
same problem here. 
 
We must use /etc/snort/snort.conf.rpmnew to get "var  
RULE_PATH /etc/snort/rules" and are not allowed to use /etc/snort/snort.conf. 
Comment 22 Klaus Singvogel 2005-04-26 15:05:50 UTC
mls: say something regarding rpmnew. :-) 
Comment 23 Klaus Singvogel 2005-04-26 16:01:44 UTC
mls: thanks. 
new packages submitted. next try. :-) 
Comment 24 Thomas Biege 2005-06-15 10:44:15 UTC
To: security-intern@suse.de
From: patch_system@suse.de
Date: Tue,  3 May 2005 16:31:27 +0200 (CEST)
Subject: [sec-int] [putonftp] secfix snort-2.3.2-7.i586.rpm
Reply-To: security-intern@suse.de
Errors-To: security-intern-bounces+thomas=suse.de@suse.de

Script 'mail_hack' called by root
package:snort-2.3.2-7.i586.rpm
comment:This update includes a fix for a denial-of-service attack which can
be triggered by an attacker by sending a malformated packet.
comment_de:Dieses Update behebt eine \374ber das Netzwerk ausl\366sbare
Denial-Of-Service Attacke.
md5sum:47df81df480fff693f912a5dad968cb5
url:ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/snort-2.3.2-7.i586.rpm
Comment 25 Marcus Meissner 2005-12-19 15:53:26 UTC
CVE-2004-2652

The DecodeTCPOptions function in decode.c in Snort before 2.3.0, when printing TCP/IP options using FAST output or verbose mode, allows remote attackers to cause a denial of service (crash) via packets with invalid TCP/IP options, which trigger a null dereference.
Comment 26 Thomas Biege 2009-10-13 20:09:34 UTC
CVE-2004-2652: CVSS v2 Base Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)