Package: dpkg
Version: 1.13.25
Severity: critical

Note: reported against the current version of dpkg,
but applies equally to all versions up to the present
time.

MD5 checksums are not secure.  A recently discovered
mathematical technique allows *ANY* document containing a
few attacker-chosen "random" blocks to have any chosen MD5
checksum. The paper is titled "Vulnerability of software
integrity and code signing applications to chosen-prefix
collisions for MD5" by Arjen Lenstra and Benne de Weger,
Bell Laboratories.  Full text is available online.[1]

In particular, it is now computationally feasible for
a single attacker with a desktop machine to modify any
executable of his or her choosing to have any desired
MD5 checksum.

Exploitation of this flaw would allow an attacker to
substitute arbitrary code for any legitimate Debian package
using a "man in the middle" attack undetected whenever a
user is installing new software, or to put up a debian
mirror site or repository containing arbitrary code
disguised as legitimate Debian software and having the same
checksums.

                Ray Dillinger



[1] http://www.win.tue.nl/hashclash/SoftIntCodeSign/



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to