Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 135112 - net-analyzer/snort Bypass Vulnerability
Summary: net-analyzer/snort Bypass Vulnerability
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://www.demarc.com/support/downloa...
Whiteboard: B4 [noglsa] jaervosz
Keywords:
: 135113 (view as bug list)
Depends on:
Blocks:
 
Reported: 2006-06-01 00:22 UTC by Dax
Modified: 2006-06-18 08:54 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Dax 2006-06-01 00:22:01 UTC
A large scale Snort evasion has been discovered by Blake Hartstein, a member of the Demarc Threat Research Team.

The evasion technique allows an attack to bypass detection of "uricontent" rules by adding a carriage return to the end of a URL, directly before the HTTP protocol declaration.

This affects thousands of rules in the standard Snort base rule sets.

For example, in order to evade detection of an AwStats Vulnerability (sid:3813), using netcat:

  $ perl -e'print "GET /awstats.pl?configdir=|backdoor\r http/1.0\r\n\r\n"'|nc vulnerable.server 80

Due to the seriousness of this vulnerability, we have developed a patch for public review. See below.

This patch addresses the carriage return bug and catches the known evasion attempts but further research should be done to determine if there are any other possible impacts of this bug. The detection for evasion is turned on by default under all profiles but can also be used as a server configuration option:

 
   -----HTTP Inspect Server Configuration----- 
 
   non_std_cr     <yes|no> 
 
   This option generates an alert when a non standard carriage return character is detected in the URI.   
 
   -----end----- 
The patch was generated for Snort version 2.4.4 , and a pre-patched Snort 2.4.4 tarball as well as the diff file is available below:
\
http://www.demarc.com/files/patch_20060531/snort-2.4.4-demarc-patched.tar.gz
http://www.demarc.com/files/patch_20060531/snort-2.4.4-demarc-patch.diff
Comment 1 Dax 2006-06-01 00:25:59 UTC
*** Bug 135113 has been marked as a duplicate of this bug. ***
Comment 2 Dax 2006-06-01 00:35:24 UTC
Could the netmon herd test this and provid ebuilds, if needed?
thanks rgds
Daxomatic

Comment 3 Markus Ullmann (RETIRED) gentoo-dev 2006-06-01 13:16:38 UTC
committed as 2.4.4-r1
Comment 4 Markus Ullmann (RETIRED) gentoo-dev 2006-06-01 13:58:56 UTC
Please test and mark stable

As all were fine with 2.4.3-r1 already, this shouldn't be that big problem, right?
Comment 5 Andrea Barisani (RETIRED) gentoo-dev 2006-06-01 16:36:13 UTC
I'd rather wait for snort.org patch rather than include the demarc one. It's not
wise to mess with snort using third-party patches and snort.org is going to
release an official one on monday.
Comment 6 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-06-02 06:23:37 UTC
netmon is this ready for stable marking or do you want to wait for the official patch?
Comment 7 Stefan Cornelius (RETIRED) gentoo-dev 2006-06-02 12:19:15 UTC
fix seems to be incomplete, waiting for official upstream release that is expected to come $soon
Comment 8 Brett Edgar 2006-06-06 07:16:49 UTC
(In reply to comment #3)
> committed as 2.4.4-r1
> 

Not sure if I should make this a new bug or not, but the new snort-2.4.4-r1 which has made it into portage now has a dependency on net-libs/libpcap instead of vitual/libpcap.  Some of us use the libpcap-ringbuffer ebuilds to get the MMIO performance improvements (see bug 117898 for a libpcap-ringbuffer ebuild that actually works...not sure why it hasn't made it into portage yet).  Despite the original title of bug 117898, libpcap-ringbuffer should (and does) provide virtual/libpcap.
Comment 9 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-06-06 08:45:09 UTC
Back to ebuild to get this regression fixed.

Netmon please fix or comment.
Comment 10 Markus Ullmann (RETIRED) gentoo-dev 2006-06-06 09:06:28 UTC
As 2.4.5 was just released, bumped now

also changed the dep to virtual back again
Comment 11 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-06-06 10:42:24 UTC
Arches please test and mark stable.
Comment 12 Markus Rothe (RETIRED) gentoo-dev 2006-06-06 11:26:08 UTC
stable on ppc64
Comment 13 Tobias Scherbaum (RETIRED) gentoo-dev 2006-06-06 12:02:49 UTC
ppc stable
Comment 14 Mark Loeser (RETIRED) gentoo-dev 2006-06-06 18:48:27 UTC
x86 done
Comment 15 Thomas Cort (RETIRED) gentoo-dev 2006-06-10 08:40:26 UTC
amd64 stable. sorry for the dely.
Comment 16 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-06-10 08:50:28 UTC
Time for GLSA vote. I tend to vote YES.
Comment 17 Andrea Barisani (RETIRED) gentoo-dev 2006-06-10 09:16:48 UTC
I vote NO. The original advisory is over-hyped, this is a minor possible evasion
which is not considered as a vulnerability by the vendor itself. It is a bug of
course but no glsa is necessary imho.
Comment 18 Thierry Carrez (RETIRED) gentoo-dev 2006-06-18 08:30:13 UTC
I tend to vote NO too. For example, a worm that would exploit awstats /and/ evade detection should have its own snort sig, rather than be caught by the usual one...
Comment 19 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-06-18 08:54:19 UTC
OK, let's kill this one without a GLSA.