quota is vulnerable to authorization bypass. The service does not use tcp_wrappers
correctly and the good_client
function in rquota_cvs.c
invokes the hosts _ctl
function without a host name, which would cause certain hosts access rules defined in /etc/hosts.allow
and /etc/hosts.deny
to be ignored and allow remote attackers to bypass access restrictions.
kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
linuxquota.git.sourceforge.net/git/gitweb.cgi?p=linuxquota/linuxquota%3Ba=commitdiff%3Bh=0abbfe92536fa5854eb65572de0cf131f80e2387
linuxquota.git.sourceforge.net/git/gitweb.cgi?p=linuxquota/linuxquota;a=commitdiff;h=0abbfe92536fa5854eb65572de0cf131f80e2387
rhn.redhat.com/errata/RHSA-2013-0120.html
sourceforge.net/tracker/?func=detail&aid=2743481&group_id=18136&atid=118136
www.openwall.com/lists/oss-security/2012/07/19/2
www.openwall.com/lists/oss-security/2012/07/19/5
access.redhat.com/security/updates/classification/#low
bugzilla.redhat.com/show_bug.cgi?id=566717
bugzilla.redhat.com/show_bug.cgi?id=667360
hermes.opensuse.org/messages/15509723
rhn.redhat.com/errata/RHSA-2013-0120.html