Security-Announce archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
NetBSD Security Advisory 2011-002: OpenSSL TLS extension parsing race condition
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
NetBSD Security Advisory 2011-002
=================================
Topic: OpenSSL TLS extension parsing race condition.
Version: NetBSD-current: source prior to February 11, 2011
NetBSD 5.0.*: affected
NetBSD 5.0: affected
NetBSD 5.1: affected
NetBSD 4.0.*: not affected
NetBSD 4.0: not affected
pkgsrc: openssl package prior to 0.9.8qnb1
Severity: Denial of Service and potential Information Disclosure
Fixed: NetBSD-current: February 11, 2011
NetBSD-5-0 branch: February 17, 2011
NetBSD-5-1 branch: February 17, 2011
NetBSD-5 branch: February 17, 2011
pkgsrc 2010Q4: openssl-0.9.8qnb1 corrects this issue
Please note that NetBSD releases prior to 4.0 are no longer supported.
It is recommended that all users upgrade to a supported release.
Abstract
========
Incorrectly formatted ClientHello handshake messages could cause OpenSSL
to parse past the end of the message.
Applications are only affected if they act as a server and call
SSL_CTX_set_tlsext_status_cb on the server's SSL_CTX. This includes
Apache httpd >= 2.3.3, if configured with "SSLUseStapling On".
This vulnerability has been assigned CVE-2011-0014.
Technical Details
=================
Incorrectly formatted ClientHello handshake messages could cause OpenSSL
to parse past the end of the message. An attacker may be able to cause
a crash (denial of service) by triggering invalid memory accesses.
The results of the parse are only available to the application using
OpenSSL so do not directly cause an information leak. However, some
applications may expose the contents of parsed OCSP extensions,
specifically an OCSP nonce extension. An attacker could use this to read
the contents of memory following the ClientHello.
See http://www.openssl.org/news/secadv_20110208.txt for the vulnerability
announcement from OpenSSL.
Solutions and Workarounds
=========================
- - Patch, recompile, and reinstall libssl.
CVS branch file revision
------------- ---------------- --------
HEAD src/crypto/external/bsd/openssl/dist/ssl/t1_lib.c 1.4
CVS branch file revision
------------- ---------------- --------
netbsd-5-1 src/crypto/dist/openssl/ssl/t1_lib.c 1.2.12.3
netbsd-5-0 src/crypto/dist/openssl/ssl/t1_lib.c 1.2.8.3
netbsd-5 src/crypto/dist/openssl/ssl/t1_lib.c 1.2.4.3
The following instructions briefly summarize how to update and
recompile libssl. In these instructions, replace:
BRANCH with the appropriate CVS branch (from the above table)
FILES with the file names for that branch (from the above table)
To update from CVS, re-build, and re-install libc and sftp:
* NetBSD-current:
# cd src
# cvs update -d -P -A crypto/external/bsd/openssl/dist/ssl
# cd lib/libcrypt
# make USETOOLS=no cleandir dependall
# make USETOOLS=no install
# cd ../../crypto/external/bsd/openssl/lib/libcrypto
# make USETOOLS=no cleandir dependall
# make USETOOLS=no install
# cd ../libssl
# make USETOOLS=no cleandir dependall
# make USETOOLS=no install
* NetBSD 5.*:
# cd src
# cvs update -d -P -r BRANCH crypto/dist/openssl/ssl
# cd lib/libcrypt
# make USETOOLS=no cleandir dependall
# make USETOOLS=no install
# cd ../libcrypto
# make USETOOLS=no cleandir dependall
# make USETOOLS=no install
# cd ../libssl
# make USETOOLS=no cleandir dependall
# make USETOOLS=no install
For more information on building (oriented towards rebuilding the
entire system, however) see:
http://www.netbsd.org/guide/en/chap-build.html
Thanks To
=========
Thanks to Neel Mehta (Google) for discovering the problem and
Adam Langley and Bodo Moeller (Google) for providing the fix.
Revision History
================
2011-03-08 Initial release
More Information
================
Advisories may be updated as new information becomes available.
The most recent version of this advisory (PGP signed) can be found at
http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2011-002.txt.asc
Information about NetBSD and NetBSD security can be found at
http://www.NetBSD.org/ and http://www.NetBSD.org/Security/ .
Copyright 2011, The NetBSD Foundation, Inc. All Rights Reserved.
Redistribution permitted only in full, unmodified form.
$NetBSD: NetBSD-SA2011-002.txt,v 1.1 2011/03/08 01:36:24 tonnerre Exp $
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (NetBSD)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=WMth
-----END PGP SIGNATURE-----
Home |
Main Index |
Thread Index |
Old Index