Date: Wed, 5 Aug 2009 18:30:08 +0200 From: Tomas Hoger <thoger@...hat.com> To: oss-security@...ts.openwall.com, "Steven M. Christey" <coley@...us.mitre.org> Cc: matthias.andree@....de Subject: Re: CVE request: fetchmail <= 6.3.10 SSL certificate NUL prefix verification bypass Hi Matthias! Thanks for the heads-up! On Wed, 05 Aug 2009 17:14:36 +0200 "Matthias Andree" <matthias.andree@....de> wrote: > Is there a global CVE ID to collect this vulnerability that is > supposed to be reused by applications? That's actually a pretty good question. This problem was first presented for Firefox/NSS and got assigned CVE-2009-2408. Similar problem also affects GnuTLS and some changes are being discussed on the -devel mailing list, with some changes and tests already in git. This should deserve a separate CVE. And than there is OpenSSL, which, as I've been told, expects applications to do name checking. So it's probably safe to assume that many / majority of client applications using OpenSSL are likely to be affected by some variant of this problem (either via CommonNames or subjectAltNames). I'm not sure if single CVE should be used here for all, or dozens of CVEs, one for each. It's likely going to be mess either way. I'm adding CC on Steven for advice. Steven, at least one CVE has already been allocated privately for similar case. -- Tomas Hoger / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.