[tor-bugs] #24430 [Core Tor/Tor]: Fix TROVE-2017-013: Use-after-free in onion service v2 when rotating intro points (was: Fix TROVE-2017-013)

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Dec 1 14:02:32 UTC 2017


#24430: Fix TROVE-2017-013: Use-after-free in onion service v2 when rotating intro
points
----------------------------+------------------------------------
 Reporter:  dgoulet         |          Owner:  (none)
     Type:  defect          |         Status:  closed
 Priority:  Medium          |      Milestone:  Tor: 0.3.3.x-final
Component:  Core Tor/Tor    |        Version:
 Severity:  Normal          |     Resolution:  fixed
 Keywords:  trove-2017-013  |  Actual Points:
Parent ID:                  |         Points:
 Reviewer:                  |        Sponsor:
----------------------------+------------------------------------
Changes (by nickm):

 * status:  new => closed
 * resolution:   => fixed


Old description:

> Ticket for high severity issue TROVE-2017-013
>
> See https://trac.torproject.org/projects/tor/wiki/TROVE

New description:

 Ticket for high severity issue TROVE-2017-013

 See https://trac.torproject.org/projects/tor/wiki/TROVE

 {{{
 TROVE-2017-13: Use-after-free in onion service v2 when rotating intro
 points

 SEVERITY: High

 ALSO TRACKED AS: CVE-2017-8823

 DESCRIPTION

     An onion service v2 expires its intro points regularly at least
     once very 24 hours. While removing an intro point, if no circuit
     is found, it is put in a retry list. Then just after, if it is
     removed because it is expiring, it is put in the expiring list.

     Tor then tries to open a circuit to that node and, on failure, it
     will free the intro point without removing it from the expiring
     list ultimately leading to a use-after-free.

     This can only happens in specific conditions which are that the
     service's is unable to launch circuits, this can happen if it is
     missing descriptors for instance and if the intro points was just
     being expired. It only affects version 2 services.

 MITIGATION NOTES:

     1. If you are not running an onion service, this doesn't affect
        you.

     2. If you are running tor version <= 0.2.6, this doesn't affect
        you.

     3. We believe this to be quite difficult to trigger remotely
        because of the specific conditions that tor needs to be
        in. However, it could be possible but hard to be induced by a
        malicious Guard node suspecting a connection to be an onion
        service.

 ACKNOWLEDGMENTS:

     Thanks to an anonymous reporter on our bugtracker that opened a
     ticket which lead to the discovery of this issue.

 FIX:

     Anybody running an onion service on an affected version should
     upgrade to one of the releases with the fix for this issue:
     0.2.8.17, 0.2.9.14, 0.3.0.13, 0.3.1.9, or 0.3.2.6-alpha.
 }}}

--

Comment:

 Fixed in today's security releases.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24430#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list