Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 67756 - net-misc/tor: Remote DoS vulnerability
Summary: net-misc/tor: Remote DoS vulnerability
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: x86 Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://archives.seul.org/or/announce/...
Whiteboard: C3 [glsa?] lewk
Keywords:
Depends on:
Blocks:
 
Reported: 2004-10-16 02:35 UTC by Sebastian L.
Modified: 2004-10-21 12:44 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sebastian L. 2004-10-16 02:35:46 UTC
please see the url for details on 0.0.8 exploit and have an ebuild for 0.0.8.l1 available.

Reproducible: Always
Steps to Reproduce:
none needed.
Comment 1 Daniel Black (RETIRED) gentoo-dev 2004-10-16 02:56:58 UTC
Remote exploit is misleading. It can cause the previous version to crash remotely (remode DoS) however it does not allow remote execution of code or remote control.
Comment 2 Peter Johanson (RETIRED) gentoo-dev 2004-10-17 19:38:41 UTC
Okay, bumped. Confering with our security folks if we should do a GLSA for this, then i'll close this bug.
Comment 3 Luke Macken (RETIRED) gentoo-dev 2004-10-17 20:11:27 UTC
Re-assigning to security.
Comment 4 Luke Macken (RETIRED) gentoo-dev 2004-10-17 20:30:47 UTC
According to latexer, ppc-macos/macos folks have their own version stable (0.0.7.3), so I sent an email upstream asking the developer if all versions previous 0.0.8 were vulnerable as well.
Comment 5 Luke Macken (RETIRED) gentoo-dev 2004-10-17 20:35:57 UTC
Upstream replied:

---
Yep, everything before 0.0.8.1 is vulnerable, and 0.0.9pre1 and pre2
are also.

It is likely that a remote shell exploit is possible against win32 and
old BSD, but probably not against Linux (including Gentoo) or new BSD.

The vulnerability is similar to the old apache chunked encoding problem
from a few years ago.

But don't hold me to this. :) I recommend upgrading.

--Roger
---

latexer, the "ball is in your court"...or something.
Comment 6 Peter Johanson (RETIRED) gentoo-dev 2004-10-17 20:41:26 UTC
OSX folks; Ya'll have a version of this marked stable currently. I know you folks changed some things with socks deps a while ago, can you please do anything needed to get 0.0.8.1 stable for you folks so we can remove all old vulnerable versions? Thanks.
Comment 7 Luke Macken (RETIRED) gentoo-dev 2004-10-20 15:33:00 UTC
OSX guys,

any updates on getting 0.0.8.1 stable?
Comment 8 Joe Jezak (RETIRED) gentoo-dev 2004-10-20 17:05:01 UTC
Keyworded in CVS for macos.  I also removed the dependency on tsock as latexer requested.
Comment 9 Luke Macken (RETIRED) gentoo-dev 2004-10-20 17:07:05 UTC
Security, please vote on glsa.

Note: this package is only marked stable on macos/ppc-macos.
Comment 10 Thierry Carrez (RETIRED) gentoo-dev 2004-10-21 02:35:26 UTC
I vote no. DoS on ~ or unsupported-arch packages should not generate GLSAs
Comment 11 Luke Macken (RETIRED) gentoo-dev 2004-10-21 12:44:16 UTC
Closing without GLSA.
Comment 12 Matthias Geerdsen (RETIRED) gentoo-dev 2004-10-21 12:44:46 UTC
would go for a no on this one too
agree with comment #10