Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 21 Aug 2012 17:59:40 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Jan Lieskovsky <jlieskov@...hat.com>
Subject: Re: CVE Request -- inn (nnrpd): Prone to STARTTLS
 plaintext command injection

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/21/2012 10:11 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,
> 
> the STARTTLS implementation in INN's NNTP server for readers, 
> nnrpd, before 2.5.3 does not properly restrict I/O buffering, which
> allows man-in-the-middle attackers to insert commands into
> encrypted sessions by sending a cleartext command that is processed
> after TLS is in place, related to a "plaintext command injection"
> attack, a similar issue to CVE-2011-0411.
> 
> References: [1] https://www.isc.org/software/inn/2.5.3article [2]
> https://bugs.gentoo.org/show_bug.cgi?id=432002 [3]
> https://bugzilla.redhat.com/show_bug.cgi?id=850478
> 
> Relevant upstream patch (the 'diff -Nurp inn-2.5.2/nnrpd/misc.c
> inn-2.5.3/nnrpd/misc.c' part): [4]
> ftp://ftp.isc.org/isc/inn/inn-2.5.2-2.5.3.diff.gz
> 
> Could you allocate a CVE id for this?

Please use CVE-2012-3523 for this issue.

> Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat
> Security Response Team
> 
> P.S.: There doesn't seem to be one for this issue yet: 
> http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=plaintext+command+injection
>
> 
no inn CVEs since .. 2004, wow.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=ZKTD
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.