Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] ERRATA: [ GLSA 200507-20 ] Shorewall: Security policy bypass
Date: Sat, 17 Sep 2005 12:50:24
Message-Id: 432C0CB8.8040603@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory [ERRATA UPDATE] GLSA 200507-20:02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Low
8 Title: Shorewall: Security policy bypass
9 Date: July 22, 2005
10 Updated: September 14, 2005
11 Bugs: #99398
12 ID: 200507-20:02
13
14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
15
16 Errata
17 ======
18
19 The "unaffected" version was incorrectly set to 2.4.1 in the initial
20 advisory, the correct "unaffected" version is 2.4.2.
21
22 The corrected sections appear below.
23
24 Synopsis
25 ========
26
27 A vulnerability in Shorewall allows clients authenticated by MAC
28 address filtering to bypass all other security rules.
29
30 Background
31 ==========
32
33 Shorewall is a high level tool for configuring Netfilter, the firewall
34 facility included in the Linux Kernel.
35
36 Affected packages
37 =================
38
39 -------------------------------------------------------------------
40 Package / Vulnerable / Unaffected
41 -------------------------------------------------------------------
42 1 net-firewall/shorewall <= 2.4.1 >= 2.4.2
43
44 Description
45 ===========
46
47 Shorewall fails to enforce security policies if configured with
48 "MACLIST_DISPOSITION" set to "ACCEPT" or "MACLIST_TTL" set to a value
49 greater or equal to 0.
50
51 Impact
52 ======
53
54 A client authenticated by MAC address filtering could bypass all
55 security policies, possibly allowing him to gain access to restricted
56 services. The default installation has MACLIST_DISPOSITION=REJECT and
57 MACLIST_TTL=(blank) (equivalent to 0). This can be checked by looking
58 at the settings in /etc/shorewall/shorewall.conf
59
60 Workaround
61 ==========
62
63 Set "MACLIST_TTL" to "0" and "MACLIST_DISPOSITION" to "REJECT" in the
64 Shorewall configuration file (usually /etc/shorewall/shorewall.conf).
65
66 Resolution
67 ==========
68
69 All Shorewall users should upgrade to the latest available version:
70
71 # emerge --sync
72 # emerge --ask --oneshot --verbose net-firewall/shorewall
73
74 References
75 ==========
76
77 [ 1 ] CAN-2005-2317
78 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2317
79 [ 2 ] Shorewall Announcement
80 http://www.shorewall.net/News.htm#20050717
81
82 Availability
83 ============
84
85 This GLSA and any updates to it are available for viewing at
86 the Gentoo Security Website:
87
88 http://security.gentoo.org/glsa/glsa-200507-20.xml
89
90 Concerns?
91 =========
92
93 Security is a primary focus of Gentoo Linux and ensuring the
94 confidentiality and security of our users machines is of utmost
95 importance to us. Any security concerns should be addressed to
96 security@g.o or alternatively, you may file a bug at
97 http://bugs.gentoo.org.
98
99 License
100 =======
101
102 Copyright 2005 Gentoo Foundation, Inc; referenced text
103 belongs to its owner(s).
104
105 The contents of this document are licensed under the
106 Creative Commons - Attribution / Share Alike license.
107
108 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature