On Thu, Jun 07, 2018 at 11:34:15PM +0200, Ondrej Zajicek wrote:
> On Thu, Jun 07, 2018 at 10:48:10PM +0200, Moritz Muehlenhoff wrote:
> > > Hi
> > > 
> > > It is an security bugfix, but perhaps not so critical, it can be
> > > exploited in very specific circumstances and probably only as a DoS,
> > > not as a privilege escalation.
> > 
> > I'm not familiar with bird, so we could use help insight to assess the
> > scope of the issue:
> > 
> > Could you please elaborate what these circumstances are? Like, who's
> > able to trigger a crash, does it affect only specific setups/conditions?
> 
> The crash could be triggered from bird CLI tool (birdc), which is usually
> accessible only to administrator. But the birdc has 'restricted' mode
> (when called with -r option) when the CLI is restricted to 'safe'
> commands, just for inspecting BIRD state, but the crash could be
> triggered even in the restricted mode. But even the restricted mode is
> accessible only to administrator.

Thanks a lot for the clarification. I was worried this could be triggerable
via BGP traffic, but that seems in fact fairly harmless.
 
> But if administrator would allow nonprivileged users to run birdc in
> restricted mode (say using 'sudo' rules) assuming than it is safe, then
> such assumption is broken by the bug.

True that, but sudo logging would also pinpoint the rogue user :-)

Cheers,
        Moritz

Reply via email to