On Tue, Jan 25, 2005 at 01:16:53PM +0100, Sebastian Hegler wrote:
> Package: bugs.debian.org
> Severity: critical
> Justification: root security hole
Its not a root security hole, since knowing an IP address does not
grant you any access to a system.  If there's up-to-date vulernable
software installed which is managed by Debian, then *that* is a
security hole.

> Full email headers are visible on "http://bugs.debian.org";.
> 
> This introduces several problems:
> 
> 1) Privacy concerns. It is just not neccessary to keep anything
> except for the "From:" (and possibly "Sender:", and "Subject:")
> header line. Absolutely nobody is required to know the IP address
> the bug reporter is online with.
Maybe so, but we use an SMTP-based BTS, and so we show all of the SMTP
information.  Having an IP address still doesn't grant you anything.
And the IPv4 address space is probably at least 25% full, so you could
also just generate a random 32 bit number.

> 2) Simplified scanning for vulnerable boxes. The source IP will be
> exposed, an all IP addresses the email traversed, and those systems
> possibly exposed their MTA in the "Delivered to:" lines. This data
> gives priceless hints on the running system and patch levels. 
I don't really see the point in "discovering" someone's mailserver.
Rather that downloading bugs, I suspect that it would be much more
efficient to run nmap.  Consider also that some anti-spam scheme's
require mailservers to be published.  Also, consider that at least
50% of the spam that gets sent is from a compromized host of some
sort; if you're trying to take over a computer, its probably easier to
wait for a spam to show up in your mailbox and then to read those
headers.  But that's not a problem with which Debian is typically
concerned.

> 3) Scenario: *1. Traverse all bug report, extract IP addresses.  *2.
> Resolve IP addresses, check for static ranges.  *3. Check those
> boxes for vulnerable software first.
That's 30GB of bugs, btw.  You now have a very long list of IP
addresses, I agree.  Okay, so you resolve the address; what does that
do for your vuln scan?  You don't want to scan that address unless its
the same computer that was used to report a bug on Debian?  That seems
unwise; if you just scan it anyway, it either will or will not
respond; no matter: if its a Debian box, then, fine scan away.  Much
worse if its a windows box, and the Asian ISP doesn't block
tcp/135-139, or if its a home router with its admin telnet/web
interface left opened, or ...

> I believe that such an attack scenario is very well possible, though
> my concerns regarding privacy clearliy weigh heavier on my mind.
Is the point to attack computers running Debian?  If not, then there
are much better and more efficient attacks anyway.

Justin,
Revealing my IPv4 address


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to