reseed(8) performs HTTP fetch of data from random.org

Bug #804594 reported by Jeffrey Walton
14
This bug affects 2 people
Affects Status Importance Assigned to Milestone
reseed (Ubuntu)
Triaged
Low
Unassigned

Bug Description

reseed(8) performs an insecure HTTP fetch of data from random.org. The script is automatically executed when installed, and any time the user chooses to execute. In addition, the reseed man pages do not mention the data is retrieved over an insecure channel.

CVE References

Revision history for this message
Jeffrey Walton (noloader) wrote :
Revision history for this message
Jeffrey Walton (noloader) wrote :
Revision history for this message
Alex Murray (alexmurray) wrote :

Have subscribed the security team to see if anyone there wants to chime in

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Thank you for taking the time to report this bug and helping to make Ubuntu better. I apologize for not responding sooner. I can confirm this issue and have given it an initial Importance of 'Low', based on the difficulty of properly timing the attack while also requiring MITM access. This can be re-evaluated if necessary.

Since the package referred to in this bug is in universe, it is community maintained. As such, I have forwarded this information to the upstream author (as found in debian/copyright) and the oss-security mailing list:
http://www.openwall.com/lists/oss-security/2011/07/06/8

Once a patch is decided upon, if you are able, I suggest posting a debdiff for this issue. When a debdiff is available, a member of the security team will review it and publish the package. Please see the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures.

Thanks again!

Changed in reseed (Ubuntu):
importance: Undecided → Low
status: New → Triaged
Revision history for this message
David Wagner (daw-bugzilla) wrote :

I'm not sure I see why this is difficult to exploit in a MITM attack or why the timing is difficult.

It would be easy to build a simple tool to MITM people who execute reseed(8) while connected to an open wireless network (e.g., at Starbucks). The automated tool could wait for a call to reseed(8) and when one is detected, automatically mount a MITM attack. This eliminates any difficulty of "timing" the attack and provides the attacker all necessary MITM access. Also, if the attacker can successfully mount a DNS hijacking attack on the random.org domain name, then that would provide an alternative attack avenue that also eliminates those difficulties.

I'm not familiar with the criteria for assigning an importance of 'Low', but I wanted to share this additional information to help you triage this bug.

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

The HTTP issue has been given CVE-2011-2683.

Revision history for this message
Dave Walker (davewalker) wrote :

Package has been removed from Oneiric.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.