Package: portmap
Version: 5-9
Severity: grave
Tags: security
Justification: user security hole
The following hosts.deny
# /etc/hosts.deny: list of hosts that are _not_ allowed to access the system.
# See the manual pages hosts_access(5), hosts_options(5)
# and /usr/doc/netbase/portmapper.txt.gz
#
# Example: ALL: some.host.name, .some.domain
# ALL EXCEPT in.fingerd: other.host.name, .other.domain
#
# If you're going to protect the portmapper use the name "portmap" for the
# daemon name. Remember that you can only use the keyword "ALL" and IP
# addresses (NOT host or domain names) for the portmapper. See portmap(8)
# and /usr/doc/portmap/portmapper.txt.gz for further information.
#
# The PARANOID wildcard matches any host whose name does not match its
# address.
# You may wish to enable this to ensure any programs that don't
# validate looked up hostnames still leave understandable logs. In past
# versions of Debian this has been the default.
# ALL: PARANOID
ALL: ALL
plus hosts.allow
# /etc/hosts.allow: list of hosts that are allowed to access the system.
# See the manual pages hosts_access(5), hosts_options(5)
# and /usr/doc/netbase/portmapper.txt.gz
#
# Example: ALL: LOCAL @some_netgroup
# ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
#
# If you're going to protect the portmapper use the name "portmap" for the
# daemon name. Remember that you can only use the keyword "ALL" and IP
# addresses (NOT host or domain names) for the portmapper, as well as for
# rpc.mountd (the NFS mount daemon). See portmap(8), rpc.mountd(8) and
# /usr/share/doc/portmap/portmapper.txt.gz for further information.
#
does not block rpcinfo -p (which returns the following:
program vers proto port
100000 2 tcp 111 portmapper
100000 2 udp 111 portmapper
100003 2 udp 2049 nfs
100003 3 udp 2049 nfs
100003 4 udp 2049 nfs
100003 2 tcp 2049 nfs
100003 3 tcp 2049 nfs
100003 4 tcp 2049 nfs
100021 1 udp 32771 nlockmgr
100021 3 udp 32771 nlockmgr
100021 4 udp 32771 nlockmgr
100021 1 tcp 35096 nlockmgr
100021 3 tcp 35096 nlockmgr
100021 4 tcp 35096 nlockmgr
100005 1 udp 703 mountd
100005 1 tcp 706 mountd
100005 2 udp 703 mountd
100005 2 tcp 706 mountd
100005 3 udp 703 mountd
100005 3 tcp 706 mountd
391002 2 tcp 920 sgi_fam
100024 1 udp 927 status
100024 1 tcp 930 status
I have tried restarting the portmap daemon and inetd after making the
hosts.deny/allow changes but that has no effect (as it should be; the
changes to hosts.x files are supposed to be enough).
strings /sbin/portmap | grep hosts returns the following:
hosts_ctl
strings /lib/libwrap.so.0 | grep hosts returns:
hosts_allow_table
hosts_deny_table
hosts_access_verbose
hosts_access
hosts_ctl
/etc/hosts.allow
/etc/hosts.deny
@(#) hosts_access.c 1.21 97/02/12 02:13:22
@(#) hosts_ctl.c 1.4 94/12/28 17:42:27
So apparently there is some problem with portmap's use of libwrap0.
I am happy to provide further information. I noticed a closed with 'it
doesn't happen here' bug #84700 which appears to be the same complaint,
albeit with less detail.
-- System Information:
Debian Release: 3.1
APT prefers testing
APT policy: (10, 'testing'), (7, 'unstable'), (3, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.15-1-k7
Locale: LANG=en_CA, LC_CTYPE=en_CA (charmap=ISO-8859-1)
Versions of packages portmap depends on:
ii libc6 2.3.5-13 GNU C Library: Shared libraries an
ii libwrap0 7.6.dbs-8 Wietse Venema's TCP wrappers libra
-- no debconf information
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]