Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 5 Aug 2009 18:30:08 +0200
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com,
        "Steven M. Christey"
 <coley@...us.mitre.org>
Cc: matthias.andree@....de
Subject: Re: CVE request: fetchmail <= 6.3.10 SSL certificate
 NUL prefix verification bypass

Hi Matthias!

Thanks for the heads-up!

On Wed, 05 Aug 2009 17:14:36 +0200 "Matthias Andree"
<matthias.andree@....de> wrote:

> Is there a global CVE ID to collect this vulnerability that is
> supposed to be reused by applications?

That's actually a pretty good question.  This problem was first
presented for Firefox/NSS and got assigned CVE-2009-2408.

Similar problem also affects GnuTLS and some changes are being
discussed on the -devel mailing list, with some changes and tests
already in git.  This should deserve a separate CVE.

And than there is OpenSSL, which, as I've been told, expects
applications to do name checking.  So it's probably safe to assume that
many / majority of client applications using OpenSSL are likely to be
affected by some variant of this problem (either via CommonNames or
subjectAltNames).  I'm not sure if single CVE should be used here for
all, or dozens of CVEs, one for each.  It's likely going to be mess
either way.  I'm adding CC on Steven for advice.  Steven, at least one
CVE has already been allocated privately for similar case.

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.