From oss-security mailing list at $URL: wicd writes sensitive information in log files (password, passphrase...) http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652417 From: Vincent Lefevre <vincent@vinc17.net> To: Debian Bug Tracking System <submit@bugs.debian.org> Subject: wicd writes sensitive information in log files (password, passphrase...) Date: Sat, 17 Dec 2011 03:27:32 +0100 Package: wicd Version: 1.7.1~b3-3 Severity: grave Tags: security Justification: user security hole wicd writes sensitive information in log files (under /var/log/wicd), such as passwords and passphrases. Users in the adm group can have access to them, but also log files are meant to be sent in bug reports, and if the bug reporter doesn't pay attention, there is a huge risk to transmit such information. http://bazaar.launchpad.net/~wicd-devel/wicd/experimental/revision/682 === modified file 'wicd/configmanager.py' --- wicd/configmanager.py 2011-12-15 18:21:53 +0000 +++ wicd/configmanager.py 2011-12-17 06:55:18 +0000 @@ -120,8 +120,13 @@ ret = to_unicode(ret) if default: if self.debug: - print ''.join(['found ', option, ' in configuration ', - str(ret)]) + # mask out sensitive information + if option in ['apsk', 'password', 'identity', 'private_key', \ + 'private_key_passwd', 'key', 'passphrase']: + print ''.join(['found ', option, ' in configuration *****']) + else: + print ''.join(['found ', option, ' in configuration ', + str(ret)]) else: if default != "__None__": print 'did not find %s in configuration, setting default %s' % (option, str(default))
Bumped to a recent snapshot including the patch: +*wicd-1.7.1_pre20120127 (27 Jan 2012) + + 27 Jan 2012; Thomas Kahle <tomka@gentoo.org> +wicd-1.7.1_pre20120127.ebuild: + bump to fix bug 401005 Shall we stable this one?
(In reply to comment #1) > Shall we stable this one? Sure. Arches, please test and mark stable: =net-misc/wicd-1.7.1_pre20120127 Target keywords : "amd64 ppc ppc64 x86"
x86: is ok
amd64 stable
x86 stable
ppc done
@ppc64 no need to spend your time to stabilize a vulnerable version. You will continue in bug 411729
GLSA vote: yes.
GLSA vote: yes. Added to existing GLSA request.
This issue was resolved and addressed in GLSA 201206-08 at http://security.gentoo.org/glsa/glsa-201206-08.xml by GLSA coordinator Sean Amoss (ackle).
CVE-2012-0813 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0813): Wicd before 1.7.1 saves sensitive information in log files in /var/log/wicd, which allows context-dependent attackers to obtain passwords and other sensitive information.