[MDEV-3915] COM_CHANGE_USER allows fast password brute-forcing Created: 2012-12-05  Updated: 2013-01-25  Resolved: 2013-01-25

Status: Closed
Project: MariaDB Server
Component/s: None
Affects Version/s: 5.5.28a, 5.3.11, 5.2.13, 5.1.66
Fix Version/s: 5.5.29, 5.2.14, 5.3.12

Type: Bug Priority: Major
Reporter: Sergei Golubchik Assignee: Sergei Golubchik
Resolution: Fixed Votes: 0
Labels: None


 Description   

If one tries to connect with an incorrect password, the connection is aborted, one has to connect again to try a new password. But if one tries an incorrect password with the COM_CHANGE_USER command, he is not disconnected, which allows to brute-force passwords faster. Additionally, all COM_CHANGE_USER issued in a connection use the same scramble value.

We can fix it by allowing only three (or any other small fixed number?) of failed COM_CHANGE_USER in a connection.

It probably shouldn't be "three fails in a row", because one would be able to alternate between two known accounts and continue trying other password.

Additionally we might add a one second (or any other short fixed time duration) delay after a failed connection or a COM_CHANGE_USER attempt.



 Comments   
Comment by Sergei Golubchik [ 2012-12-05 ]

http://seclists.org/fulldisclosure/2012/Dec/58

Comment by Jan Lieskovsky [ 2012-12-06 ]

The CVE identifier of CVE-2012-5627 has been assigned to this issue:
http://www.openwall.com/lists/oss-security/2012/12/06/4

Generated at Thu Feb 08 06:52:14 UTC 2024 using Jira 8.20.16#820016-sha1:9d11dbea5f4be3d4cc21f03a88dd11d8c8687422.