Re: Fwd: Any user can panic OpenBSD machine

From: Theo de Raadt (deraadtat_private)
Date: Mon Jul 27 1998 - 21:05:45 PDT

  • Next message: Felix Schroeter: "Re: Fwd: Any user can panic OpenBSD machine"

    > In response to this, and in response to the person who privately called
    > my forwarding of the bug report "lameness," I have this to say:  The
    > bug report was forwarded to some OpenBSD list to which I must have
    > subscribed at one time.  If the OpenBSD listfolk didn't want the bug
    > known about then they should have kept it amongst the developers.
    
    I myself take no issue with the disclosure of this bug to people.
    
    Whoopty doo -- another way to crash another operating system has been
    reported.  This is twice now that a 'local' OpenBSD crash has made it
    to bugtraq as if it were a typical exploit.  Does this now mean
    bugtraq is open ground for reporting any way to crash a multiuser
    operating system?  I bet there are plenty of ways to crash any
    operating system, if you have a local account.
    
    However, this bug does not by itself provide anyone with a way to gain
    elevated priviledges and greater control of the system.  That is what
    most of us normally call an 'exploit', or has the lingo changed
    recently?
    
    On the other hand, my guess is that people expect a whole lot of
    OpenBSD now, which well, is fine, we will continue to try.. but don't
    get too upset if a few human failings show through.  I am on a few
    Linux developer mailing lists, and I see ways to crash Linux get
    discussed all the time.  But I have not seen many ways to crash Linux
    on BUGTRAQ, so I think people expect more of us.
    
    That is good -- we'll be trying to meet those expectations :-)
    
    > I for one was appalled at the simplicity of the
    > exploit in what's claimed to be one of the most secure operating
    > systems around, especially since it doesn't appear to be a problem
    > with the other BSDs.
    
    Well, I find it hard to believe that you are making that particular
    statement without bias.  We are human, too.  We make mistakes from
    time to time.  Who knows, maybe tomorrow someone will crash your
    machine using such an `exploit' for your favorite operating system.
    
    That said, the problem is now fixed and a patch is available.
    
    The fix we have now stops the panic, and increases our conformance to
    the XPG standard because we found a few other bugs along the way.  I
    bet many systems have similar problems with sendmsg() and recvmsg(),
    and also problems with out-of-range values of iovcnt.
    
    Certainly (I should emphasize this) the XPG standard, and probably
    other standards too, make it clear that EINVAL is NOT a conforming
    result for that particular test code.  (Apparently some operating
    system groups are fixing security problems by introducing new bugs).
    Certainly, the subtle non-conformance of system calls has led to
    higher-level security problems before.
    
    In any case, see
    
            www.openbsd.org/errata.html#resid
    
    for a patch which applies to 2.3.  Thanks to Todd Miller and Costa
    Sapuntzakis for working on this patch.
    
    Also, please see
            www.openbsd.org/security.html
    
    for information on other security fixes which are far more important,
    yet strangely have not reached BUGTRAQ like this report did.
    
    
    > Black hats distribute these kind of exploits quickly.  Let's make sure a
    > few white hats know about them too.
    
    Black hats distribute information on how to crash systems?  I thought
    they were concentrating on breaking root.
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:08:46 PDT