loginmsg bug
Damien Miller
djm at mindrot.org
Wed Jul 9 20:21:29 EST 2008
On Wed, 9 Jul 2008, Dag-Erling Smørgrav wrote:
> Cf. http://seclists.org/fulldisclosure/2008/Jul/0090.html
>
> This Mrdkaaa character claims to have exploited this, but does not say
> how.
hmm, loginmsg starts empty and is filled from three sources:
- The contents of a sshd_config:Banner file (if any)
- Password expiry messages generated by sshd
- Messages generated by PAM
Of these three, the PAM messages are the only ones that could
possibly be attacker-controlled (e.g. echoing back a deliberately
corrupted username), but I don't know off the top of my head whether
any PAM modules will actually do that. The actual bug happens in the path
that handles a failed PAM account check, so it will have accrued these
messages.
The second difficulty in exploiting this in the wild is that that
the packet_disconnect() call should only ever happen in the unprivileged
slave process. Maybe the reporter disabled privsep for his/her demo?
-d
More information about the openssh-unix-dev
mailing list