Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 417207 (CVE-2012-2385) - <net-misc/mosh-1.2.0.95 : Escape Sequence Denial of Service (CVE-2012-2385)
Summary: <net-misc/mosh-1.2.0.95 : Escape Sequence Denial of Service (CVE-2012-2385)
Status: RESOLVED FIXED
Alias: CVE-2012-2385
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/49260/ ...
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2012-05-23 06:27 UTC by Michael Harrison
Modified: 2012-07-13 21:22 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Michael Harrison 2012-05-23 06:27:02 UTC
The vulnerability is caused due to an error within mosh-server when processing commands and can be exploited to pass control characters to the server and trigger an endless loop.

Upstream Commit:https://github.com/keithw/mosh/commit/9791768705528e911bfca6c4d8aa88139035060e

Original Advisory
https://github.com/keithw/mosh/issues/271

There is some debate via OSS-Sec whether this is a true DoS or to what extent it would tie up resources, but the commit caps the escape sequence and Secunia filed an advisory so I added a bug. 

Thanks
Comment 1 Michael Weber (RETIRED) gentoo-dev 2012-05-23 07:41:36 UTC
There's an CVE request [0].

But calling this problem a "less-critical remote vulnerability" is just ridiculous.

First, it's an local attack on the machine running mosh-server. The user has authenticated himself (most likely by ssh) on the machine to run a shell.

Second, it's as dangerous as any shell allowing "cat /dev/urandom > /dev/null".

Please don't waste your time ;-)

"That's a DoS quite literally, but it's not a vulnerability or security problem." 
([1])

Michael

[0] http://seclists.org/oss-sec/2012/q2/370
[1] https://github.com/keithw/mosh/issues/271#issuecomment-5849882
Comment 2 Michael Weber (RETIRED) gentoo-dev 2012-05-23 08:41:18 UTC
I've bumped the version to the current 1.2.1 release candidate (called 1.2.0.95), which includes the mentioned upstream patch, and removed all "affected" version from tree.

@security: should I add an package.mask to force users to upgrade? 

+*mosh-1.2.0.95 (23 May 2012)
+
+  23 May 2012; Michael Weber <xmw@gentoo.org> -mosh-1.2.ebuild,
+  -mosh-1.2-r1.ebuild, -files/mosh-1.2-r1-remove-skalibs.patch,
+  +mosh-1.2.0.95.ebuild, -files/mosh-1.2-shared-skalibs.patch,
+  -files/mosh-1.2-shared-skalibs-fix-configure.patch:
+  Version bump to address bug 417207, remove all mentioned version.
+
Comment 3 Agostino Sarubbo gentoo-dev 2012-05-23 08:43:13 UTC
Thanks, fixed
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2012-07-13 21:22:19 UTC
CVE-2012-2385 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2385):
  The terminal dispatcher in mosh before 1.2.1 allows remote authenticated
  users to cause a denial of service (long loop and CPU consumption) via an
  escape sequence with a large repeat count value.