Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 453308 - <net-irc/atheme-services-7.0.6-r1: "external logout" Denial of Service vulnerability
Summary: <net-irc/atheme-services-7.0.6-r1: "external logout" Denial of Service vulner...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/51852/
Whiteboard: C3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-01-21 10:02 UTC by Agostino Sarubbo
Modified: 2016-06-30 09:00 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-01-21 10:02:12 UTC
From $URL :

Description
A vulnerability has been reported in Atheme, which can be exploited by malicious people to cause a 
DoS (Denial of Service).

The vulnerability is caused due to a NULL-pointer dereference error (modules/nickserv/logout.c) 
when handling an external logout request and can be exploited to crash Atheme IRC services.

The vulnerability is reported in versions 7.0.5.


Solution
Fixed in the source code repository.

Provided and/or discovered by
Reported by the vendor.

Original Advisory
https://github.com/atheme/atheme/commit/1aaa9e8f1d0b0b67b36c2a6318c71beaa7f39194

http://packetstormsecurity.org/files/119635/Atheme-IRC-Services-7.0.5-Denial-Of-Service.html
Comment 1 Sean Amoss (RETIRED) gentoo-dev Security 2013-03-03 23:01:11 UTC
Maintainers, can you please check if this also affects 6.0.11?
Comment 2 Jeff (JD) Horelick (RETIRED) gentoo-dev 2013-03-08 16:19:23 UTC
This does not affect 6.0.x. The feature that caused the issue was first implemented in 7.0.0
Comment 3 Sean Amoss (RETIRED) gentoo-dev Security 2013-03-11 23:05:27 UTC
(In reply to comment #2)
> This does not affect 6.0.x. The feature that caused the issue was first
> implemented in 7.0.0

Thanks, Jeff!
Comment 4 Chris Reffett (RETIRED) gentoo-dev Security 2013-09-17 00:55:40 UTC
Any word on getting that patch applied?
Comment 5 Robert Förster 2014-11-02 11:38:03 UTC
this has been resolved with the addition of 7.0.6, affected versions are not in the tree anymore.
Comment 6 Aaron Bauman (RETIRED) gentoo-dev 2016-03-18 08:00:44 UTC
Per Ago's initial comment the github repo shows that the commit fixing external logout wasn't included until 7.1.0.

https://github.com/atheme/atheme/commit/1aaa9e8f1d0b0b67b36c2a6318c71beaa7f39194

@maintainer, please bump the package.  7.2.6 is available upstream.

After the bump please call let us know if you would like to stabilize the package.  Thank you.
Comment 7 Aaron Bauman (RETIRED) gentoo-dev 2016-06-01 10:09:45 UTC
Still no bump from maintainer(s).  Candidate for tree cleaning.  Masking.

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=bbd375ecb40b70d324749730bf8dc6eb3e00e01e
Comment 8 dwfreed 2016-06-04 02:32:16 UTC
This is fixed in 7.0.6, just the commit ago linked to is on the master branch, and so doesn't show the 7.0.6 tag.  The project only does development on the master branch; maintenance releases are done on a release branch for that major/minor version, created upon the major/minor's release.

https://github.com/atheme/atheme/commits/atheme-services-7.0.6

The commit that fixes the vulnerability on the release/7.0 branch is here:

https://github.com/atheme/atheme/commit/ef0561d1f7611c23b312baee74fc16f38ce93977
Comment 9 Aaron Bauman (RETIRED) gentoo-dev 2016-06-04 06:08:16 UTC
package.mask entry removed.

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=88484c9740f9ab2e4774183b7922a7922a0a662e

@maintainer(s), please cleanup the vulnerable version in the tree.
Comment 10 Aaron Bauman (RETIRED) gentoo-dev 2016-06-04 06:34:07 UTC
Sorry, this should be stabilized and then cleaned.

@arches, please test and mark stable =net-irc/atheme-services-7.0.6-r1
Comment 11 Agostino Sarubbo gentoo-dev 2016-06-10 13:01:49 UTC
amd64 stable
Comment 12 Agostino Sarubbo gentoo-dev 2016-06-27 08:48:15 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 13 Aaron Bauman (RETIRED) gentoo-dev 2016-06-30 09:00:16 UTC
All vulnerable 7.x ebuilds have been cleaned.

Per previous comments the feature that was vulnerable was introduced in the 7.x code base.

GLSA Vote: No