[scponly] scponly 4.2 released (IMPORTANT SECURITY FIXES)

Kaleb Pederson kpederson at mail.ewu.edu
Thu Dec 22 11:08:27 EST 2005


Joe,

Thanks for your constant efforts to improve scponly!  It's a valuable tool 
used by many.

--Kaleb

On Wednesday 21 December 2005 4:49 pm, wby oblyr wrote:
> Hi all,
>
> I'm disappointed to report that there are TWO security fixes in the latest
> version of scponly.  Descriptions and solutions are discussed below.  (they
> are also described in detail at http://sublimation.org/scponly/#relnotes )
>
> Some other features have made it into the release as well, though not
> nearly as many as I had hoped.  Given the nature of the security fixes, I
> did not want to wait.
>
> To get 4.2, visit http://sublimation.org/scponly
>
> MD5 (scponly-4.2.tgz) = 270dedc527d6fbc68b152b8bb3c8a864
>
> For the programmers on the list, I'd appreciate some scrutiny on the fixes
> I have implemented for these problems. As usual, your collective testing
> and validation is very valuable to the project.
>
> joe
>
>
>
>
> SECURITY PROBLEM 1, reported by Max Vozeler:
>
> Problem Description:
> If ALL the following conditions are true, administrators using scponly-4.1
> or older may be at risk of a local privilege escalation exploit:
>
>  - the chrooted setuid scponlyc binary is installed
>  - regular non-scponly users have interactive shell access to the box
>  - a user executable dynamically linked setuid binary (such as ping) exists
> on the same file system mount as the user's home directory
>  - the operating system supports an LD_PRELOAD style mechanism to overload
> dynamic library loading
>
> Exploit:
> To exploit this vulnerability, a non-root user could:
>  - log in via an interactive shell
>  - create an ad-hoc chroot directory structure in their home directory
> (with bin, lib, etc directories) - create a hardlink to a system setuid
> program, such as ping (which is setuid), effectively placing a setuid
> binary in their chroot.  (this is why the setuid binary has to be on the
> same mount point, as hardlinks cannot traverse file systems and softlinks
> cannot traverse outside the chroot) - stage a malicious ld preload
> configuration to overload a call from the setuid (such as getuid()) with
> one that does something malicious
> - users invoke scponlyc (the setuid chrooting scponly binary), which then
> chroots into their malicious chroot environment, call the setuid program
> (ping), which then calls the overridden function (getuid), doing whatever
> it is they wrote into their custom library
>
> Fix:
> The new release of scponly-4.2 disallows chrooting to any directory that:
>         - is owned by someone other than the superuser (UID 0)
>         - is writeable by group or other
>
> This assures that every chroot scponly uses was created/approved by the
> system administrator and thus is assumed to not contain malicious
> ld.preload.conf files.
>
> SECURITY PROBLEM 2, reported by Pekka Pessi:
>
> Problem Description:
> If ANY the following conditions are true, administrators using scponly-4.1
> or older may be at risk of a local privilege escalation exploit:
>
>  - scp compatibility is enabled
>  - rsync compatibility is enabled
>
> Exploit:
> To exploit this vulnerability, a remote scponly user could:
>  - construct a malicious command line argument to either the rsync or scp..
>  Athough scponly does check for arguments that allow the user to specify a
> program to run, it does not use getopt() style processing to locate these
> potentially malicious arguments.  As such "scp -vS some_executable file1
> file2" would get past the malicious argument detection.
>
> Fix:
> The new release of scponly-4.2:
>  - uses getopt to process the arguments to scp and rsync.
>  - does not support rsync or scp by default
>
>
>
>
>
>
>
> _______________________________________________
> scponly mailing list
> scponly at lists.ccs.neu.edu
> https://lists.ccs.neu.edu/bin/listinfo/scponly
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : https://lists.ccs.neu.edu/pipermail/scponly/attachments/20051222/0e997610/attachment.bin


More information about the scponly mailing list