Bug 85842 (CVE-2006-5639) - VUL-0: CVE-2006-5639: AUDIT-0: OpenWBEM
Summary: VUL-0: CVE-2006-5639: AUDIT-0: OpenWBEM
Status: RESOLVED FIXED
Alias: CVE-2006-5639
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other All
: P5 - None : Major
Target Milestone: ---
Assignee: Bart Whiteley
QA Contact: Security Team bot
URL: http://openwbem.sourceforge.net/
Whiteboard: CVE-2006-5639: CVSS v2 Base Score: 7....
Keywords:
Depends on:
Blocks: 65423
  Show dependency treegraph
 
Reported: 2005-05-25 10:25 UTC by Thomas Biege
Modified: 2021-11-03 15:06 UTC (History)
5 users (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
sec-openwbem-arch.html (8.24 KB, text/html)
2005-05-25 10:33 UTC, Thomas Biege
Details
Audit report (38.30 KB, application/pdf)
2005-06-27 10:07 UTC, Sebastian Krahmer
Details
patch for buffer overflow vulnerabilities (2.22 KB, patch)
2005-08-11 22:33 UTC, Bart Whiteley
Details | Diff
new patch (7.57 KB, patch)
2005-08-24 20:02 UTC, Bart Whiteley
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Biege 2005-05-25 10:25:28 UTC
Date: Wed, 25 May 2005 10:39:57 +0200
From: Marius Tomaschewski <mt@suse.de>
To: security-team@suse.de
User-Agent: Mutt/1.5.9i
Cc: okir@suse.de, choeger@suse.de
Subject: [security-team] [dnuffer@vintela.com: [Openwbem-devel] RFC: New
        Secure OpenWBEM Architecture]
Reply-To: security-team@suse.de
Errors-To: security-team-bounces+thomas=suse.de@suse.de

[-- Anhang #1 --]
[-- Typ: text/plain, Kodierung: 8bit, GröÃe: 1,5K --]

Hi Security-Team!

Könntet Ihr Euch das Overview-Doc im Attachment bitte genauer unter
die Lupe nehmen und auf openwbem-devel@lists.sourceforge.net (bzw.
Dan Nuffer) kommentieren?

Da OpenWBEM eine zentrale Rolle in unseren Management Tools spielen
wird, wÀre es gut, es schon mal fÌr einen Security-Audit vorzumerken.

Danke!

----- Forwarded message from Dan Nuffer <dnuffer@vintela.com> -----

Resent-From: Bart Whiteley <bwhiteley@novell.com>
Resent-Date: Tue, 24 May 2005 15:10:46 -0600
From: Dan Nuffer <dnuffer@vintela.com>
To: mt@suse.de
Subject: [Openwbem-devel] RFC: New Secure OpenWBEM Architecture
Reply-To: openwbem-devel@lists.sourceforge.net
Date: Tue, 24 May 2005 15:11:42 -0600

For the past few weeks, Kevin Van Horn and I have been working on a new
architecture for owcimomd with the primary goal to greatly reduce the
chance of a sucessful privilege escalation attack. The overall goal has
been to increase the security, so we have also considered some
additional threats such as tampering with data, repudiation, information
disclosure and denial of service.

We have been storing documentation in CVS under doc/engineering/sec-*.

I've attached the overview document, and I'd like to hear everyone's
comments.

--
Dan Nuffer
Vintela, Inc. http://vintela.com/
----- End forwarded message -----

Gruesse,
 Marius Tomaschewski <mt@suse.de>
--
 SUSE LINUX, Nuernberg --- Development, Server-Team
 PGP public key on:   http://www.suse.de/~mt/mt.pgp
 DF17 271A AD15 006A 5BB9  6C96 CA2F F3F7 373A 1CC0

[-- Anhang #2: sec-openwbem-arch.html --]
[-- Typ: text/html, Kodierung: 7bit, GröÃe: 8,2K --]
Comment 1 Thomas Biege 2005-05-25 10:33:54 UTC
Created attachment 38088 [details]
sec-openwbem-arch.html
Comment 3 Bart Whiteley 2005-05-25 14:52:52 UTC
This bug should somehow reference #65423.  What would be the right 
way to do that?  
Comment 4 Thomas Biege 2005-05-30 13:42:30 UTC
Here is some discussion about the design of openwbem:

http://sourceforge.net/mailarchive/forum.php?thread_id=7358198&forum_id=1847
Comment 5 Sebastian Krahmer 2005-06-14 09:48:18 UTC
Ok, I started the audit. :-)
Seems like the rpm could be installed :-)
Will preint setup and architecture docs now.
Comment 6 Sebastian Krahmer 2005-06-14 10:12:14 UTC
There is no cim-schema package in /work/... but the docs
say one must install one.
Comment 7 Marius Tomaschewski 2005-06-14 10:42:12 UTC
I would say, the *.mof files are in the novell-life package:

/work/SRC/all/novell-life

or better, the successor project NIM, that providers all cimv2.9
mof's as well as some of the new classes from v2.9.1pre:

https://forge.provo.novell.com/modules/xfmod/project/?nim

export CVSROOT=":ext:kulge.provo.novell.com:/cvsroot/nim"


The actual / official MOF files are at:

http://www.dmtf.org/standards/cim
http://www.dmtf.org/standards/cim/cim_schema_v291_prelim/CIM_V2.9.1Preliminary-MOFs.zip

Comment 8 Thomas Biege 2005-06-15 09:57:16 UTC
bug #65423 may be worth reading.
Comment 9 Sebastian Krahmer 2005-06-27 10:07:51 UTC
Created attachment 39970 [details]
Audit report

Attached the audit report. Please have a look.
Comment 10 Bart Whiteley 2005-06-27 21:54:00 UTC
To what extent can I share this audit report with OpenWBEM developers outside 
of the company?  
Comment 11 Marcus Meissner 2005-06-28 07:34:46 UTC
feel free to share with all openwbem developers. 
Comment 12 Sebastian Krahmer 2005-07-20 12:34:11 UTC
ping. anyone read the report yet? :-)
Comment 13 Sebastian Krahmer 2005-08-09 12:07:29 UTC
Guys, anyone alive?
There is a remotely exploitable buffer overflow condition in a product
we ship. Nobody cares???

Comment 14 Marius Tomaschewski 2005-08-09 12:24:59 UTC
Hmm...  I would say, it makes sense to reasign it to Bart (maintainer).
Comment 15 Bart Whiteley 2005-08-09 16:29:12 UTC
The audit report mentioned many items.  Could we get a separate bug specifically
for this exploitable buffer overflow of which you speak? 
Comment 16 Thomas Biege 2005-08-09 16:47:50 UTC
I think there are two:
- HTTPChunkedIStreamBuffer()
- HTTPLenLimitIStreamBuffer()
Comment 17 Bart Whiteley 2005-08-09 17:03:29 UTC
Jon Carey, Dan Nuffer (external), and I did review the security audit in some
detail soon after it was given to us.  Sorry I didn't report our comments at the
time.  Let me see if I can summarize them, then later I'll try to address each
one.  Basic sentiments were: 

- Much appreciation for the audit. 
- Some items had already been fixed in CVS. 
- Some disagreement on some items.  For example, audit complains that OW
implements its own strtoll() instead of using the one in the system libs. 
Actually, the OW implementation of strtoll() is only used on plats that don't
provide one, so on Linux the system strtoll() is used. 
- Some items were legitimate and weren't yet fixed in CVS.  It's possible they
have been fixed in CVS since.  I'll have to check. 

I'll start checking CVS to see which, if any, of the items remain to be fixed. 
Then we need to decide which, if any, items need to be back ported for sles9
updates. Wouldn't it be appropriate for separate bugs to be created for these? 
Comment 18 Sebastian Krahmer 2005-08-10 07:26:09 UTC
Ok. Usually we dont create a single entry per bug to be fixed.
The work to handle it grows non-linear. I think its easier to
have everything in this bugzilla thread. And there are not that many bugs.
We will just wait for the CVS diff which bugs actually have to be fixed
and what needs to be backported.
Comment 19 Bart Whiteley 2005-08-11 22:33:34 UTC
Created attachment 45841 [details]
patch for buffer overflow vulnerabilities

How about the attached patch?
Comment 20 Sebastian Krahmer 2005-08-15 10:30:12 UTC
Looks ok but the last chunk should also have a tmpLen < 0
check, just in case. I'd rather like to have all size fields
as unsigned but this would probably require too many changes.
As far as I see only the XMLUnEscape() is left.

Comment 21 Sebastian Krahmer 2005-08-22 10:01:11 UTC
ping :-)
Comment 22 Bart Whiteley 2005-08-24 19:11:09 UTC
WRT XMLUnEscape() 
 
12:14 <dnuffer>In the XML code it may just be simpler to use: unsigned long 
                 lval = strtoul 
12:57 <whiteley>I thought about doing the strtoul(). 
12:57 <whiteley>but didn't like what the man page said. 
12:57 <whiteley>if it's negative, it just flips the sign. 
13:05 <dnuffer>either way, that fix isn't really necessary, because the lexer 
                 first has to match the input. The regex is essentially [0-9]+ 
13:06 <dnuffer>so no way a - could be passed to strtoul() 
 
Comment 23 Bart Whiteley 2005-08-24 20:02:51 UTC
Created attachment 47461 [details]
new patch

see if you like this patch better.
Comment 24 Sebastian Krahmer 2005-08-29 08:42:13 UTC
Yes, it looks ok from my perspective.
Comment 25 Bart Whiteley 2005-09-06 20:38:19 UTC
I've submitted a patched OpenWBEM for sles9.  Now what?  
Comment 26 Marius Tomaschewski 2005-09-06 22:32:19 UTC
I'm not sure if I'm still up to date with the patch process, but:

It may make sense to set NEEDINFO to gp (SLES9, SLES9-SP3, no patch? ;)
but I mean the decision is clear in case of security-team, and this is
already done in Comment #24.

Call "is_maintained openwbem" and create patchinfo file for the
concerned distributions (should be done bellow) and send it via
mail to suse-dist@suse.de and put it to /work/src/done/PATCHINFO/.

If there already exists a SWAMPID, add it to the dummy bellow.
If not, it will be assigned later.

You can monitor the patch process at:
  http://w2d.suse.de/abuildstat/patch-status

cat <<EOT >/work/src/done/PATCHINFO/openwbem-sles9.patchinfo
DISTRIBUTION: sles9-i386,sles9-ia64,sles9-ppc,sles9-s390,sles9-s390x,sles9-x86_64
PACKAGE: openwbem
PACKAGER: bwhiteley@suse.de
BUGZILLA: 85842
SWAMPID:
CATEGORY: security
INDICATIONS: All users of openwbem should update.
CONTRAINDICATIONS: None.
DESCRIPTION:

 Enter a detailed description of the fix here.

EOT
Comment 27 Marius Tomaschewski 2005-09-06 22:34:16 UTC
Ahm...
PACKAGER: bwhiteley@novell.com
Comment 28 Sebastian Krahmer 2005-09-19 11:52:06 UTC
Anything happend here? Shall I submit patchinfos? I think its only
a maintained product. I will open SWAMP if you decided to make
updates for older distributions.
Comment 29 Bart Whiteley 2005-09-19 20:26:52 UTC
I just followed the steps outlined by Marius.  Now what?
Comment 30 Harald Mueller-Ney 2005-09-20 15:03:29 UTC
We are missing a SWAMP-ID should be provided by security team for security updates.
I sent an eMail to security-team. Sebastian volenteered see comment #28
Comment 31 Sebastian Krahmer 2005-09-26 10:37:07 UTC
SM-Tracker 2377.
Sorry for delay, last week I was on SuSE-Labs con and this week on
vacation.
I will update the patchinfos in /work/...
Comment 32 Sebastian Krahmer 2005-09-26 10:39:13 UTC
bart, can you fill in the Swamp-ID into the patchinfo yourself?
I am missing the proper permissions and its mode 0644.
Comment 33 Bart Whiteley 2005-09-26 19:30:13 UTC
looks like someone already did it.  
Comment 34 Sebastian Krahmer 2005-10-04 13:23:29 UTC
Bart, the final patch was the one from comment #23 right?
We`d like to inform the other vendors about it before releasing.

Comment 35 Bart Whiteley 2005-10-04 17:48:57 UTC
That is correct.  The patch is from #23.  
Comment 36 Bart Whiteley 2005-10-07 23:30:07 UTC
Looks like this isn't in SLES9-SP3-beta2.  Should it be?  It looks like it 
is in dist/full/full-sles9-beta-*.  It is not however in  
machcd/SLES/SLES-9-SP-3-i386-Beta2/CD2/suse/i586/ 
 
Should it not be in SLES9-SP3-beta2? 
Comment 37 Marcus Meissner 2005-10-10 12:50:40 UTC
security fixes are done in the mainbranch, they will not show up in beta. 
 
They will be collected (as patch) on SP release. 
 
if you have another openwbem version in the BETA branch (for SP3), 
this one needs to be fixed too. 
Comment 38 Bart Whiteley 2005-10-10 16:03:13 UTC
does "mainbranch" mean sles9?   
  
"They will be collected (as patch) on SP release."   
What does this mean?  
 
Do I need to 'submitpac -dr sles9-beta openwbem' with my patched  
sources?  
Comment 39 Marcus Meissner 2005-10-11 08:38:19 UTC
no, you do not need to do anything anymore. 
Comment 40 Heiko Rommel 2005-10-11 13:17:17 UTC
SUSE QA:

Do we have any specific bug fix tests for this patch/audit?
Comment 41 Sebastian Krahmer 2005-10-17 14:10:55 UTC
Advisory and packages released. closing.
Comment 42 Marcus Meissner 2005-11-08 16:33:45 UTC
mitre assigned:

CVE-2005-3298
CVE-2005-3297
Comment 43 Marcus Meissner 2006-11-07 09:47:47 UTC
*** Bug 218684 has been marked as a duplicate of this bug. ***
Comment 44 Marcus Meissner 2006-11-07 09:48:50 UTC
Mitre has also assigned CVE-2006-5639 out of confusion.
Comment 45 Thomas Biege 2009-10-13 22:55:03 UTC
CVE-2006-5639: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)