Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 178517 - media-sound/teamspeak2-server-bin Privilege Escalation and Cross-Site Scripting
Summary: media-sound/teamspeak2-server-bin Privilege Escalation and Cross-Site Scripting
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/25242/
Whiteboard: B4 [noglsa] jaervosz
Keywords:
: 184926 (view as bug list)
Depends on:
Blocks:
 
Reported: 2007-05-14 14:52 UTC by Lars Hartmann
Modified: 2007-08-24 12:16 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Lars Hartmann 2007-05-14 14:52:32 UTC
Description:
Gilberto Ficara has reported a security issue and some vulnerabilities in TeamSpeak, which can be exploited by malicious users to gain escalated privileges and by malicious people to conduct cross-site scripting attacks.

1) The problem is that it is possible for a Server Admin to grant certain privileges like "AccessWebAdminServer", "AdminAddServer", "AdminDeleteServer", "AdminStartServer", and "AdminStopServer" to registered users. This can be exploited to create, start, stop, or delete servers by creating a user and accessing certain administrative pages as this user directly.

Successful exploitation requires Server Admin access to the application.

2) Input passed to the "error_title" and "error_text" parameters in error_box.html and to the "ok_title" parameter in ok_box.html is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Successful exploitation requires that the user is currently logged in.

The vulnerabilities are confirmed in version 2.0.20.1. Other versions may also be affected.

Solution:
The vulnerabilities have reportedly been fixed in version 2.0.23.15 BETA.

Filter malicious characters and character sequences in a web proxy. Grant only trusted users Super Admin privileges.

Reproducible: Always
Comment 1 Lars Hartmann 2007-05-14 14:55:54 UTC
maintainers - please provide an updated ebuild
Comment 2 Lars Hartmann 2007-05-21 09:41:50 UTC
maintainers - please advice
Comment 3 Lars Hartmann 2007-05-30 16:27:39 UTC
maintainers please advice
Comment 4 Lars Hartmann 2007-06-07 02:02:12 UTC
maintainers - please advise and bump as necessary
Comment 5 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-06-10 08:11:15 UTC
No answer from maintainers. I propose we mask this one.

Security what is your opinion?
Comment 6 Lars Hartmann 2007-06-12 16:00:52 UTC
it is definitely unmantained so lets mask it.
maybe we can open a "who wants to mantain that package"-bug
Comment 7 Vic Fryzel (shellsage) (RETIRED) gentoo-dev 2007-06-16 10:24:37 UTC
I vote mask GLSA.
Comment 8 Matt Drew (RETIRED) gentoo-dev 2007-06-16 11:14:05 UTC
I'm ok with masking - the product is definitely maintained, but it's closed source, so unless someone on our side is willing to handle it ...
Comment 9 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-06-16 19:46:02 UTC
Sound, last chance for a comment.
Comment 10 Lars Hartmann 2007-06-25 19:59:59 UTC
i think they got their chance
Comment 11 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-06-25 21:48:38 UTC
Someone with the magic powers, please use them.
Comment 12 Jakub Moc (RETIRED) gentoo-dev 2007-07-11 07:12:56 UTC
*** Bug 184926 has been marked as a duplicate of this bug. ***
Comment 13 Sebastian Siewior 2007-08-02 21:10:23 UTC
from http://www.goteamspeak.com/:

TeamSpeak 2.0.23.19 with Security Patches Now Available
Written by Florence on August 02, 2007 21:29 CEST

Is that one also vulnerable?
Comment 14 Martin Jackson (RETIRED) gentoo-dev 2007-08-03 18:02:35 UTC
http://www.teamspeak.com/index.php?page=newsarchive&id=18

According to this link, the most serious problem (privilege escalation) is fixed in the 2.0.23.19 release.

I am a teamspeak user (I run a teamspeak server for a group of my friends), so I can bump and validate.  I will work on it today/tomorrow as I can.
Comment 15 Martin Jackson (RETIRED) gentoo-dev 2007-08-03 18:28:40 UTC
Bumped to 2.0.23.19 in CVS.  I have also taken ownership of the package.
Comment 16 Sebastian Siewior 2007-08-03 19:34:20 UTC
Someone with powers should release a GLSA
Comment 17 Martin Jackson (RETIRED) gentoo-dev 2007-08-11 20:23:59 UTC
There is another release upcoming in a few days, which fixes more security issues - to be designated 2.0.23.22.  I will bump in CVS when the package is released.  See http://forum.teamspeak.com/showthread.php?t=38801 for details.
Comment 18 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-08-14 06:47:01 UTC
Martin any news on the new version or should we just get arches to mark the current one stable?
Comment 19 Martin Jackson (RETIRED) gentoo-dev 2007-08-14 23:32:05 UTC
The new version hasn't been officially released yet.  I'll check the forum and see if they've announced when they will; one possibility is that I could add the updated binary as a patch.
Comment 20 Martin Jackson (RETIRED) gentoo-dev 2007-08-15 01:55:46 UTC
OK, my best reading of the situation is as follows:  The issue originally reported is fixed in 2.0.23.19 (the version I bumped to), so there would be some value in stabilizing that.  *HOWEVER*, they found another vulnerability (cross-site scripting, it seems) that potentially allows reading of arbitrary files on the server's filesystem, if the web management interface is enabled.  So there's a 2.0.23.22 that should be officially packaged (it was released Aug 11), but I'm not sure when.  The binaries have been published but not as an "official" release as of yet.

If there is not an official release tomorrow (Aug 15), I'll work on an ebuild based on 2.0.23.19 that uses the official binary from 2.0.23.22.  The binary is the only difference between the two releases. 
Comment 21 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-08-15 05:45:18 UTC
Thx for the status Martin.
Comment 22 Martin Jackson (RETIRED) gentoo-dev 2007-08-16 00:17:26 UTC
I have bumped to 2.0.23.22.  This is not an official release, but this method of updating was recommended to their newsletter members.  The ebuild downloads 2.0.23.19 (the last official packaged version) and overlays it with the 2.0.23.22 binary (which I hand-copied to distfiles-local).  When an official 2.0.23.22 (or later) is released, I'll update the ebuild.

Meanwhile, I think we should start testing/stabling this one.
Comment 23 Martin Jackson (RETIRED) gentoo-dev 2007-08-17 03:13:01 UTC
Note:  I have committed a 2.0.23.22-r1 which includes changelog.txt from the 2.0.23.22 directory for #189097.  This replaces the previous 2.0.23.22 ebuild but the addition of changelog.txt is the only difference.
Comment 24 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-08-17 21:38:03 UTC
Thx Martin.

x86 and amd64 please test and mark stable.
Comment 25 Christian Faulhammer (RETIRED) gentoo-dev 2007-08-18 18:59:22 UTC
x86 stable
Comment 26 Christoph Mende (RETIRED) gentoo-dev 2007-08-21 14:21:27 UTC
amd64 stable
Comment 27 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-08-21 20:33:33 UTC
This one is ready for GLSA vote. I vote NO.
Comment 28 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-08-24 12:16:20 UTC
IMHO The priv. esacalation is not a real problem. As I understand it, it states that a Super admin has the power to screw up the system. I wouldn't call that a "vulnerability", but a rather normal behaviour on almost every system :) 
And the resolution says "Grant only trusted users Super Admin privileges." Oh, really? :)

the other vuln is a classic XSS, so voting NO too and closing without glsa. feel free to reopen if you disagree.