Bugtraq mailing list archives

Re: Multiple Vendor "talkd" user validation fault.


From: Mike Scher <mscher () neohapsis com>
Date: Fri, 5 Apr 2002 10:54:56 -0600 (CST)

On 3 Apr 2002, Tekno pHReak wrote:
[...]
Their exist a flaw within the "talkd" which allows anyone masquerade as
anyone else either remotely or within the confines of the system. This
is due to the lack of user validation by the "talkd"  for incoming
"talk" requests. This may be a catalyist for social engineering which
can lead to the revealing of private or sensitive information from other
users.
[...]

Ah, talk request spoofing.

This very problem was discussed way back in 1996 on Best Of Security
(BoS). It's good to see people are still talking about the problem and
proving it IS an issue.

I suppose the sad part of it all is that this problem was discussed,
shrugged off, and more or less ignored for so long that it's resurfaced,
complete with a new tool to exploit it.  Kudos to Teknophreak for bringing
it to light again, and for the publication of the spoofer, since that may
hammer the issue home.

A copy of the informative 1996 posting by Rombout de Backer (r () idb nl) is
at: http://www.tao.ca/writing/archives/security/0214.html

A cleaner copy, from a repost to the OpenBSD lists, is at:
http://www.monkey.org/openbsd/archive/tech/9604/msg00010.html


de Backer also posted a one-liner proof-of-concept change to the talk from
NetKit-B-0.05, and there were modified ytalk clients floating around with
command-line options for spoofing by the end of April, 1996.  Any
suggested fixes to talk will only work locally, where the daemon can do
some checking; any remote fixes really depend on changing the protocol or
migrating to a safer (or explicitly untrusted) chat system.  AUTH lookups
(as suggested in the de Backer post) don't really cut it:  n/talk are UDP
protocols.

      -M

-- 
      Michael Brian Scher                        mscher () neohapsis com
                   Mailaise: n, ('mail-aze).  See Outlook.



Current thread: