10762660 2003-09-30 15:27 +0100 /93 rader/ Mark J Cox <mark@openssl.org>
Importerad: 2003-09-30 17:04 av Brevbäraren
Extern mottagare: openssl-users@openssl.org
Extern mottagare: openssl-dev@openssl.org
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Extern mottagare: full-disclosure@lists.netsys.com
Extern mottagare: openssl-announce@openssl.org
Mottagare: Bugtraq (import) <29332>
Ärende: [OpenSSL Advisory] Vulnerabilities in ASN.1 parsing
------------------------------------------------------------
From: Mark J Cox <mark@openssl.org>
To: openssl-users@openssl.org, <openssl-dev@openssl.org>,
 <BUGTRAQ@SECURITYFOCUS.COM>, <full-disclosure@lists.netsys.com>,
 <openssl-announce@openssl.org>
Message-ID: <Pine.LNX.4.44.0309301524520.7250-100000@pingu.awe.com>

-----BEGIN PGP SIGNED MESSAGE-----

OpenSSL Security Advisory [30 September 2003]

Vulnerabilities in ASN.1 parsing
================================

NISCC (www.niscc.gov.uk) prepared a test suite to check the operation
of SSL/TLS software when presented with a wide range of malformed
client certificates.

Dr Stephen Henson (steve@openssl.org) of the OpenSSL core team
identified and prepared fixes for a number of vulnerabilities in the
OpenSSL ASN1 code when running the test suite.

A bug in OpenSSLs SSL/TLS protocol was also identified which causes
OpenSSL to parse a client certificate from an SSL/TLS client when it
should reject it as a protocol error.

Vulnerabilities
- ---------------

1. Certain ASN.1 encodings that are rejected as invalid by the parser
can trigger a bug in the deallocation of the corresponding data
structure, corrupting the stack. This can be used as a denial of
service attack. It is currently unknown whether this can be exploited
to run malicious code. This issue does not affect OpenSSL 0.9.6.

2. Unusual ASN.1 tag values can cause an out of bounds read under
certain circumstances, resulting in a denial of service vulnerability.

3. A malformed public key in a certificate will crash the verify code
if it is set to ignore public key decoding errors. Public key decode
errors are not normally ignored, except for debugging purposes, so
this is unlikely to affect production code. Exploitation of an
affected application would result in a denial of service
vulnerability.

4. Due to an error in the SSL/TLS protocol handling, a server will
parse a client certificate when one is not specifically
requested. This by itself is not strictly speaking a vulnerability
but it does mean that *all* SSL/TLS servers that use OpenSSL can be
attacked using vulnerabilities 1, 2 and 3 even if they don't enable
client authentication.

Who is affected?
- ----------------

All versions of OpenSSL up to and including 0.9.6j and 0.9.7b and all
versions of SSLeay are affected.

Any application that makes use of OpenSSL's ASN1 library to parse
untrusted data. This includes all SSL or TLS applications, those using
S/MIME (PKCS#7) or certificate generation routines.

Recommendations
- ---------------

Upgrade to OpenSSL 0.9.7c or 0.9.6k. Recompile any OpenSSL
applications statically linked to OpenSSL libraries.

References
- ----------

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0545 for issue 1:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545

and CAN-2003-0543 and CAN-2003-0544 for issue 2:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544

URL for this Security Advisory:
http://www.openssl.org/news/secadv_20030930.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQCVAwUBP3mNKu6tTP1JpWPZAQFjPwP/Y8epYBa9oCK69dCT5Y90kg9Ir8pYuv+q
x4NxuyhD5JaJfmStwbl3BUSE5juI0mh7d6yFjfI0Ci3sdC+5v10ZOanGwX7o4JlS
3pGSSocAEiYS59qciRLtFsCbBt8jIOCG8KiTmKO2mI5dhAEB9UqPH9e8A1Wy/8un
xjGKYbcITrM=
=fFTe
-----END PGP SIGNATURE-----
(10762660) /Mark J Cox <mark@openssl.org>/(Ombruten)