News

Developers fixed four authorization vulnerabilities in OpenBSD

The developers of the open operating system OpenBSD eliminated four vulnerabilities of authorization tools, which allowed bypassing protection mechanisms and increase privileges on the target machine. Although at the time of publication, the bugs did not receive a threat rating on the CVSS scale, however, experts have no doubt about the practical use of exploits.

OpenBSD, an open-source multi-platform OS, provides many elements of the IT infrastructure that require additional protection. Information security was one of the key priorities for the creators of the system, so OpenBSD is often used to manage firewalls, mail and Internet servers.

Qualys experts reported the discovery of new bugs to developers.

“OpenBSD, an open-source operating system built with security in mind, has been found vulnerable to four new high-severity security vulnerabilities, one of which is an old-school type authentication bypass vulnerability in BSD Auth framework”, — write Qualys specialists.

The most serious bug (CVE-2019-19521) is contained in the OpenBSD authorization framework. The researchers found that if you add a hyphen to the username, the program perceives this combination of characters as a command. This allowed experts to penetrate the system, bypassing password verification.

Read also: Google released December patches for Android, which fixed dozens of vulnerabilities

The method works in smtpd, ldapd and radiusd services. Sshd and su provide additional security mechanisms that block the connection when authentication is bypassed.

Other vulnerabilities can be used after penetration into the system to obtain additional rights:

  1. CVE-2019-19520 was detected in the xlock component, which is part of the basic system configuration. An access path management error allows an attacker to elevate privileges to a group level.
  2. CVE-2019-19522is associated with the work of the S / Key and YubiKey authorization mechanisms, which are disabled by default, but can be reactivated by the system administrator. In the latter case, an attacker could use a bug to gain root access to the system.
  3. CVE-2019-19519 in one of the basic functions of the su utility that enables access to any authorization class except root access.

In 2018, researchers found an error in the OpenBSD package that remained in the code for 19 years. The vulnerability of the SSH component, which is responsible for the security of Internet connections, allowed to pick up a username when attacking web resources.

Recommendations:

It took developers less than two days to fix the vulnerabilities that were discovered. They encourage all OpenBSD users of branches 6.5 and 6.6 to upgrade their builds. Since patches for all four security vulnerabilities are now available, affected OpenBSD users recommended to install patches using syspatch mechanism.

William Reddy

I am from Ireland. My parents bought me a computer when I was 11, and several month after I have got a virus on this PC. I decided to enter the INSA Centre Val de Loire university after being graduated from the school. This French educational institution was offering a brand-new cybersecurity course. After getting the master degree in cybersecurity, I've started working in as virus analyst in a little anti-malware vendor. In 2018, I've decided to start Virus Removal project. The main target of this site is to help people to deal with PC viruses of any kind.

Leave a Reply

Your email address will not be published. Required fields are marked *

Sending

Back to top button