Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 5 Jun 2012 15:54:02 -0600
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: openldap does not honor TLSCipherSuite configuration
 option

Could a CVE be assigned to this issue?

It was reported that OpenLDAP, when using the Mozilla NSS backend, would
ignore any TLSCipherSuite configuration settings.  When the
TLSCipherSuite setting is configured, OpenLDAP would use the default
cipher suite, ignoring the setting.

While the default cipher suite contains some weak ciphers (e.g.
MD5-based), it is still not easy to break the encryption to obtain
sensitive information.  However, if an administrator wishes to enforce
the use of stronger ciphers by overriding the defaults using
TLSCipherSuite, they should be able to trust that, when the
configuration items is in place, the stronger ciphers are used.  Due to
this flaw, that is not the case.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=825875
http://www.openldap.org/its/index.cgi?findid=7285
http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=2c2bb2e


Thanks.

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.