← Back to team overview

openstack team mailing list archive

Re: [OSSA 2012-002] Extremely long passwords can crash Keystone (CVE-2012-1572)

 

On Tue, Mar 27, 2012 at 02:56:42PM -0400, Russell Bryant wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> OpenStack Security Advisory: 2012-002
> CVE: CVE-2012-1572
> Date: March 27, 2012
> Title: Extremely long passwords can crash Keystone
> Impact: High
> Reporter: Dan Prince <dprince@xxxxxxxxxx>
> Products: Keystone
> Affects: All versions
> 
> Description:
> Dan Prince reported a vulnerability in Keystone. He discovered that
> you can remotely trigger a crash in Keystone by sending an extremely
> long password. When Keystone is validating the password, glibc
> allocates space on the stack for the entire password. If the password
> is long enough, stack space can be exhausted, resulting in a crash.
> This vulnerability is mitigated by a patch to impose a reasonable
> limit on password length (4 kB).

What about raising an exception back to the callers, rather than silently
accepting it with truncation ?

Regards,
Daniel
-- 
|: http://berrange.com      -o-    http://www.flickr.com/photos/dberrange/ :|
|: http://libvirt.org              -o-             http://virt-manager.org :|
|: http://autobuild.org       -o-         http://search.cpan.org/~danberr/ :|
|: http://entangle-photo.org       -o-       http://live.gnome.org/gtk-vnc :|


References