Date: Wed, 21 Mar 2012 12:32:59 +0100 From: Stefan Cornelius <scorneli@...hat.com> To: oss-security@...ts.openwall.com Subject: CVE request: GnuTLS TLS record handling issue / MU-201202-01 Hi, Correcting myself as more details about the GnuTLS case were revealed: GnuTLS needs a CVE after all, for another issue different from CVE-2012-1569. Quoting the Mu Dynamics advisory : The block cipher decryption logic in GnuTLS assumed that a record containing any data which was a multiple of the block size was valid for further decryption processing, leading to a heap corruption vulnerability. The bug can be reproduced in GnuTLS 3.0.14 by creating a corrupt GenericBlockCipher struct with a valid IV, while everything else is stripped off the end, while the handshake message length retains its original value: [...] This will cause a segmentation fault, when the ciphertext_to_compressed function tries to give decrypted data to _gnutls_auth_cipher_add_auth for HMAC verification, even though the data length is invalid, and it should have returned GNUTLS_E_DECRYPTION_FAILED or GNUTLS_E_UNEXPECTED_PACKET_LENGTH instead, before _gnutls_auth_cipher_add_auth was called. NOTE: This CVE request is only for the GnuTLS TLS record handling issue / MU-201202-01. When looking at the release notes  and , there are other issues that may be worthy of a CVE, but are currently still under investigation: ** libgnutls: Eliminate double free during SRP authentication. Reported by Peter Penzov. ** libgnutls: PKCS #11 objects that do not have ID no longer crash listing. Reported by Sven Geggus. -- References --  Mu Dynamics: http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/  GnuTLS 3.0.15 release announcement: http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5912  GnuTLS 2.12.17 release announcement: http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5910  GNUTLS-SA-2012-2: http://www.gnu.org/software/gnutls/security.html  Red Hat bug: https://bugzilla.redhat.com/show_bug.cgi?id=805432 Thanks and kind regards, -- Stefan Cornelius / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ