Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 20 Mar 2012 13:40:35 +0100
From: Stefan Cornelius <scorneli@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: libtasn1 "asn1_get_length_der()" DER decoding issue

Hi,

libtasn1 version 2.12 was released fixing the following issue:

  - Corrected DER decoding issue (reported by Matthew Hall).
    Added self check to detect the problem, see tests/Test_overflow.c.
    This problem can lead to at least remotely triggered crashes, see
    further analysis on the libtasn1 mailing list.

Further issue details from Simon Josefsson [1]:

I want to mention that there were no security problem in the
asn1_get_length_der function.  It was working properly and as documented
before.  The security problem was the callers not checking that the
returned values were reasonable, i.e., that the output length was less
than or equal to the total length of the buffer.  However, fixing all
callers of this function would be a huge amount of work.  Instead, we
made asn1_get_length_der return an error code when the situation
occured, to protect callers.  This fix could be the wrong thing if some
code out there calls the function with a der_len parameter that is
smaller than the entire DER structure length.  However, we are hoping
that is not in any significant use, and that overall security will be
improved by having the function sanity check its output rather than
letting the caller do that.  This was a judgement call.

[1] http://thread.gmane.org/gmane.comp.gnu.libtasn1.general/54

It appears like GnuTLS is affected as well (but probably does not need a
separate CVE at this point):
http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5952/
http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5957/

-- References --

Release announcement:
http://article.gmane.org/gmane.comp.gnu.libtasn1.general/53

Small analysis + patch:
http://thread.gmane.org/gmane.comp.gnu.libtasn1.general/54

Red Hat bug:
https://bugzilla.redhat.com/show_bug.cgi?id=804920

Thanks and kind regards,
-- 
Stefan Cornelius / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.