Date: Wed, 21 Mar 2012 12:32:59 +0100 From: Stefan Cornelius <scorneli@...hat.com> To: oss-security@...ts.openwall.com Subject: CVE request: GnuTLS TLS record handling issue / MU-201202-01 Hi, Correcting myself as more details about the GnuTLS case were revealed: GnuTLS needs a CVE after all, for another issue different from CVE-2012-1569. Quoting the Mu Dynamics advisory : The block cipher decryption logic in GnuTLS assumed that a record containing any data which was a multiple of the block size was valid for further decryption processing, leading to a heap corruption vulnerability. The bug can be reproduced in GnuTLS 3.0.14 by creating a corrupt GenericBlockCipher struct with a valid IV, while everything else is stripped off the end, while the handshake message length retains its original value: [...] This will cause a segmentation fault, when the ciphertext_to_compressed function tries to give decrypted data to _gnutls_auth_cipher_add_auth for HMAC verification, even though the data length is invalid, and it should have returned GNUTLS_E_DECRYPTION_FAILED or GNUTLS_E_UNEXPECTED_PACKET_LENGTH instead, before _gnutls_auth_cipher_add_auth was called. NOTE: This CVE request is only for the GnuTLS TLS record handling issue / MU-201202-01. When looking at the release notes  and , there are other issues that may be worthy of a CVE, but are currently still under investigation: ** libgnutls: Eliminate double free during SRP authentication. Reported by Peter Penzov. ** libgnutls: PKCS #11 objects that do not have ID no longer crash listing. Reported by Sven Geggus. -- References --  Mu Dynamics: http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/  GnuTLS 3.0.15 release announcement: http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5912  GnuTLS 2.12.17 release announcement: http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5910  GNUTLS-SA-2012-2: http://www.gnu.org/software/gnutls/security.html  Red Hat bug: https://bugzilla.redhat.com/show_bug.cgi?id=805432 Thanks and kind regards, -- Stefan Cornelius / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.