Overview
This week we look at updates for vulnerabilities in wpa_supplicant, Samba, systemd, wget and more and we talk to Joe about IoT security (or the prevailing lack-thereof).
This week in Ubuntu Security Updates
[USN-3939-1, USN-3939-2] Samba vulnerability
1 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, CosmicCVE-2019-3880Symlink path traversal vulnerability in the Windows Registry service emulation RPC API end-pointAllows a local user to create a new registry file anywhere they have Unixpermissions to do so within the Samba share
Bypasses share restrictions such as read-only and share ACLsAlso allows to create the file outside the share itself if there isalready a symlink pointing outside the shared areas
Fixed by removing the ability to save or restore registry keys at all viathis RPC API end-point
[USN-3940-1, USN-3940-2] ClamAV vulnerabilities
3 CVEs addressed in Precise ESM, Trusty, Xenial, Bionic, CosmicCVE-2019-1789CVE-2019-1788CVE-2019-17873 file-handling issues2 OOB heap read when handling PE (Windows EXE and DLL) and PDF files ->crash -> DoS
OOB heap write when scanning OLE2 files (old format Microsoft Officedocuments), crash -> DoS or possible code execution
[USN-3941-1] Lua vulnerability
1 CVEs addressed in Xenial, Bionic, CosmicCVE-2019-6706UAF if calling debug.upvaluejoin() with the same function for both function parameters[USN-3938-1] systemd vulnerability
1 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2019-3842Failure to properly sanitize environment before using XDG_SEATAttacker could set XDG_SEAT such that they can have actions checkedagainst the wrong PolicyKit policy
Allows a remotely logged in attacker (SSH) to run commands which shouldbe restricted to only physically present users
Fixed by using secure_getenv() rather than just getenv() - so that ifrunning via su the existing value is effectively scrubbed from the
environment and ignored
[USN-3942-1] OpenJDK 7 vulnerability
1 CVEs addressed in TrustyCVE-2019-2422Information leak allows a remote attacker to possibly leverage this tobypass the Java sandbox
[USN-3943-1, USN-3943-2] Wget vulnerabilities
2 CVEs addressed in Trusty, Xenial, Bionic, Cosmic (1 in Precise ESM)CVE-2019-5953CVE-2018-20483Heap buffer overflow due to improper memory management - crash -> DoS or possible code executionBy default wget would store the origin URL in an extended attribute on the downloaded fileCould include username / passwordgetfattr -d to dumpchanged to NOT store extended attributes by default AND to strip outany credentials when doing so
doesn’t effect Precise ESM[USN-3937-2] Apache vulnerabilities
4 CVEs addressed in Precise ESMCVE-2018-1312CVE-2018-1301CVE-2017-15710CVE-2019-0217Episode 27 covered mod_auth_digest bypass for other supported releasesAlso includes 3 other issues:Nonce generated to prevent reply attacks for HTTP digest authenticationchallenenge wasn’t sufficiently random
Could allow and attacker to reply across a cluster of servers withthe same common digest authentication configuration
changed to actually use a proper random sourcePossible OOB read -> crash -> DoSPossible one-byte memory corruption if specify a character encoding ofonly 1 byte (since assumes is at least 2 bytes and so writes a NULL at
index +2 which could be past the end of the header) - crash, DoS
[USN-3944-1] wpa_supplicant and hostapd vulnerabilities
5 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2016-10743CVE-2019-9499CVE-2019-9498CVE-2019-9497CVE-2019-9495Fix fallback to low-quality PRNG if failed to get an actual random value for a WPS pinMultiple vulnerabilities discovered in the implementation of WPA3 inhostapd and wpa_supplicant (aka Dragonblood)
2 apply to SAE (Simultaneous Authentication of Equals , also known asDragonfly Key Exchange) not relevant since we don’t enable SAE support
in our builds (this is used for initial key exchange instead of PSK)
4 apply to the use of EAP-PWD - Extensible Authentication ProtocolPassword
cache side channel attackreflection attackmay allow an attacker to authenticate without the password butlikely not derive session key or complete the key exchange so no
loss of confidentiality
2 failure to validate crypto componentscould allow attacker to authenticate AND gain access to session keyand get network access
[USN-3945-1] Ruby vulnerabilities
6 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2019-8325CVE-2019-8324CVE-2019-8323CVE-2019-8322CVE-2019-8321CVE-2019-8320Symlink directory traversal issue - gem would delete the targetdestination before creating any new directories or files when extracting
a Gem - as this is often run via sudo could allow to delete anything on
target system
Fixed to check target paths are symlinks5 different code-injection attacks:4 via injection of terminal escape sequences in debug code paths to stdoutone via eval() of the stub line in a gemspec file[USN-3946-1] rssh vulnerabilities
3 CVEs addressed in Trusty, Xenial, Bionic, CosmicCVE-2019-3464CVE-2019-3463CVE-2019-1000018Possible to execute arbitrary shell commands since failed to properlysanitize environment variables and command-line arguments when executing
rsync or scp
Removed from archive in disco since dead upstreamGoings on in Ubuntu Security Community
IoT Security discussion with Joe McManus
https://arstechnica.com/information-technology/2019/04/new-variants-of-mirai-botnet-detected-targeting-more-iot-devices/https://www.ubuntu.com/coreHiring
Ubuntu Security Generalist
https://boards.greenhouse.io/canonical/jobs/1548812Robotics Security Engineer
https://boards.greenhouse.io/canonical/jobs/1550997Get in contact
#ubuntu-security on the Libera.Chat IRC network@ubuntu_sec on twitter