Package: openssl
Version: 0.9.8f-1
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for openssl.

CVE-2008-0891[0]:
| OpenSSL Server Name extension crash
| 
| Testing using the Codenomicon TLS test suite discovered a flaw in the
| handling of server name extension data in OpenSSL 0.9.8f and OpenSSL
| 0.9.8g.  If OpenSSL has been compiled using the non-default TLS server
| name extensions, a remote attacker could send a carefully crafted
| packet to a server application using OpenSSL and cause a crash.

CVE-2008-1672[1]:
| OpenSSL Omit Server Key Exchange message crash
| 
| Testing using the Codenomicon TLS test suite discovered a flaw if the
| 'Server Key exchange message' is omitted from a TLS handshake in
| OpenSSL 0.9.8f and OpenSSL 0.9.8g.  If a client connects to a
| malicious server with particular cipher suites, the server could cause
| the client to crash.

Please not that these discriptions are not yet published on the mitre site.
Check out http://www.openssl.org/news/secadv_20080528.txt in the meantime.

Patches for both issues are attached.

If you fix the vulnerabilities please also make sure to include the
CVE ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891
    http://security-tracker.debian.net/tracker/CVE-2008-0891
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672
    http://security-tracker.debian.net/tracker/CVE-2008-1672

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
Index: CHANGES
===================================================================
RCS file: /e/openssl/cvs/openssl/CHANGES,v
retrieving revision 1.1238.2.86
diff -u -r1.1238.2.86 CHANGES
--- CHANGES	28 Feb 2008 13:35:58 -0000	1.1238.2.86
+++ CHANGES	18 Mar 2008 12:06:57 -0000
@@ -4,6 +4,9 @@
 
  Changes between 0.9.8g and 0.9.8h  [xx XXX xxxx]
 
+  *) Fix double free in TLS server name extensions which could lead to a remote
+     crash found by Codenomicon TLS test suite (CVE-2008-0891) [Joe Orton]
+
   *) Fix BN flag handling in RSA_eay_mod_exp() and BN_MONT_CTX_set()
      to get the expected BN_FLG_CONSTTIME behavior.
      [Bodo Moeller (Google)]
Index: ssl/t1_lib.c
===================================================================
RCS file: /e/openssl/cvs/openssl/ssl/t1_lib.c,v
retrieving revision 1.13.2.8
diff -u -r1.13.2.8 t1_lib.c
--- ssl/t1_lib.c	18 Oct 2007 11:39:11 -0000	1.13.2.8
+++ ssl/t1_lib.c	18 Mar 2008 12:06:58 -0000
@@ -381,6 +381,7 @@
 						s->session->tlsext_hostname[len]='\0';
 						if (strlen(s->session->tlsext_hostname) != len) {
 							OPENSSL_free(s->session->tlsext_hostname);
+							s->session->tlsext_hostname = NULL;
 							*al = TLS1_AD_UNRECOGNIZED_NAME;
 							return 0;
 						}
Index: CHANGES
===================================================================
RCS file: /e/openssl/cvs/openssl/CHANGES,v
retrieving revision 1.1238.2.86
diff -u -r1.1238.2.86 CHANGES
--- CHANGES	28 Feb 2008 13:35:58 -0000	1.1238.2.86
+++ CHANGES	22 May 2008 09:19:30 -0000
@@ -4,6 +4,10 @@
 
  Changes between 0.9.8g and 0.9.8h  [xx XXX xxxx]
 
+  *) Fix flaw if 'Server Key exchange message' is omitted from a TLS
+     handshake which could lead to a cilent crash as found using the
+     Codenomicon TLS test suite (CVE-2008-1672) [Steve Henson, Mark Cox]
+
   *) Fix BN flag handling in RSA_eay_mod_exp() and BN_MONT_CTX_set()
      to get the expected BN_FLG_CONSTTIME behavior.
      [Bodo Moeller (Google)]
Index: ssl/s3_clnt.c
===================================================================
RCS file: /e/openssl/cvs/openssl/ssl/s3_clnt.c,v
retrieving revision 1.88.2.12
diff -u -r1.88.2.12 s3_clnt.c
--- ssl/s3_clnt.c	3 Nov 2007 13:07:39 -0000	1.88.2.12
+++ ssl/s3_clnt.c	22 May 2008 09:19:30 -0000
@@ -2061,6 +2061,13 @@
 			{
 			DH *dh_srvr,*dh_clnt;
 
+                        if (s->session->sess_cert == NULL) 
+                                {
+                                ssl3_send_alert(s,SSL3_AL_FATAL,SSL_AD_UNEXPECTED_MESSAGE);
+                                SSLerr(SSL_F_SSL3_SEND_CLIENT_KEY_EXCHANGE,SSL_R_UNEXPECTED_MESSAGE);
+                                goto err;
+                                }
+
 			if (s->session->sess_cert->peer_dh_tmp != NULL)
 				dh_srvr=s->session->sess_cert->peer_dh_tmp;
 			else

Attachment: pgpqXIqIyLW16.pgp
Description: PGP signature

Reply via email to