summaryrefslogtreecommitdiff
blob: b6b9a92aa2cff583042655a86e0fa0766d3d56bb (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200507-20">
  <title>Shorewall: Security policy bypass</title>
  <synopsis>
    A vulnerability in Shorewall allows clients authenticated by MAC address
    filtering to bypass all other security rules.
  </synopsis>
  <product type="ebuild">shorewall</product>
  <announced>2005-07-22</announced>
  <revised count="02">2005-09-14</revised>
  <bug>99398</bug>
  <access>remote</access>
  <affected>
    <package name="net-firewall/shorewall" auto="yes" arch="*">
      <unaffected range="ge">2.4.2</unaffected>
      <vulnerable range="le">2.4.1</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Shorewall is a high level tool for configuring Netfilter, the firewall
    facility included in the Linux Kernel.
    </p>
  </background>
  <description>
    <p>
    Shorewall fails to enforce security policies if configured with
    "MACLIST_DISPOSITION" set to "ACCEPT" or "MACLIST_TTL" set to a value
    greater or equal to 0.
    </p>
  </description>
  <impact type="low">
    <p>
    A client authenticated by MAC address filtering could bypass all
    security policies, possibly allowing him to gain access to restricted
    services. The default installation has MACLIST_DISPOSITION=REJECT and
    MACLIST_TTL=(blank) (equivalent to 0). This can be checked by looking
    at the settings in /etc/shorewall/shorewall.conf
    </p>
  </impact>
  <workaround>
    <p>
    Set "MACLIST_TTL" to "0" and "MACLIST_DISPOSITION" to "REJECT" in the
    Shorewall configuration file (usually /etc/shorewall/shorewall.conf).
    </p>
  </workaround>
  <resolution>
    <p>
    All Shorewall users should upgrade to the latest available version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose net-firewall/shorewall</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2317">CAN-2005-2317</uri>
    <uri link="http://www.shorewall.net/News.htm#20050717">Shorewall Announcement</uri>
  </references>
  <metadata tag="requester" timestamp="2005-07-20T08:32:24Z">
    koon
  </metadata>
  <metadata tag="submitter" timestamp="2005-07-20T09:04:23Z">
    DerCorny
  </metadata>
  <metadata tag="bugReady" timestamp="2005-07-21T21:07:14Z">
    DerCorny
  </metadata>
</glsa>