[ANNOUNCE] mod_ssl 2.8.18

[ANNOUNCE] mod_ssl 2.8.18

am 27.05.2004 15:21:37 von rse

A security issue was discovered.
It is now fixed with mod_ssl 2.8.18.
Please upgrade your installations ASAP.

o http://www.modssl.org/source/
o ftp://ftp.modssl.org/source/
Ralf S. Engelschall
rse@engelschall.com
www.engelschall.com

Changes with mod_ssl 2.8.18 (11-May-2004 to 27-May-2004)

*) Fix buffer overflow in "SSLOptions +FakeBasicAuth" implementation
if the Subject-DN in the client certificate exceeds 6KB in length.
(CVE CAN-2004-0488).

*) Handle the case of OpenSSL retry requests after interrupted system
calls during the SSL handshake phase.

*) Remove some unused functions.

____________________________________________________________ __________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List modssl-users@modssl.org
Automated List Manager majordomo@modssl.org

Re: [ANNOUNCE] mod_ssl 2.8.18

am 27.05.2004 17:02:50 von Udo Schweigert

On Thu, May 27, 2004 at 15:21:37 +0200, Ralf S. Engelschall wrote:
> Changes with mod_ssl 2.8.18 (11-May-2004 to 27-May-2004)
>=20
> *) Fix buffer overflow in "SSLOptions +FakeBasicAuth" implementation
> if the Subject-DN in the client certificate exceeds 6KB in length=
..
> (CVE CAN-2004-0488).
>=20

Is that also an issue in apache-2.x? (I wasn't able to find that CVE, so =
I
ask here ;-)

Best regards

Udo
--
Udo Schweigert, Siemens AG | Voice : +49 89 636 42170
CT IC CERT, Siemens CERT | Fax : +49 89 636 41166
D-81730 München / Germany | email : Udo.Schweigert@siemens.com
____________________________________________________________ __________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List modssl-users@modssl.org
Automated List Manager majordomo@modssl.org

RE: [ANNOUNCE] mod_ssl 2.8.18

am 27.05.2004 17:09:17 von Boyle Owen

> -----Original Message-----
> From: Udo Schweigert [mailto:Udo.Schweigert@siemens.com]
> Sent: Donnerstag, 27. Mai 2004 17:03
> To: modssl-users@modssl.org
> Subject: Re: [ANNOUNCE] mod_ssl 2.8.18
>=20
>=20
> On Thu, May 27, 2004 at 15:21:37 +0200, Ralf S. Engelschall wrote:
> > Changes with mod_ssl 2.8.18 (11-May-2004 to 27-May-2004)
> >=20
> > *) Fix buffer overflow in "SSLOptions +FakeBasicAuth"=20
> implementation
> > if the Subject-DN in the client certificate exceeds=20
> 6KB in length.
> > (CVE CAN-2004-0488).
> >=20
>=20
> Is that also an issue in apache-2.x? (I wasn't able to find=20
> that CVE, so I
> ask here ;-)

The problem was originally identified on apache2 (see
http://www.securityfocus.com/bid/10355/) and it has already been patched
there.=20

Incidentally, AFAIK there is no vulnerability unless you are using
"SSLOptions FakeBasicAuth". It's a fairly specialised option so my
feeling is that this doesn't urgently affect a whole lot of people... Of
course, you should still upgrade just in case some time in the future
you do switch that option on.

Rgds,
Owen Boyle
Disclaimer: Any disclaimer attached to this message may be ignored.=20

>=20
> Best regards
>=20
> Udo
> --
> Udo Schweigert, Siemens AG | Voice : +49 89 636 42170
> CT IC CERT, Siemens CERT | Fax : +49 89 636 41166
> D-81730 München / Germany | email : =
Udo.Schweigert@siemens.com
> ____________________________________________________________ __________
> Apache Interface to OpenSSL (mod_ssl) www.modssl.org
> User Support Mailing List modssl-users@modssl.org
> Automated List Manager majordomo@modssl.org
>=20
Diese E-mail ist eine private und persönliche Kommunikation. Sie hat
keinen Bezug zur Börsen- bzw. Geschäftstätigkeit der SWX Gruppe. =
This
e-mail is of a private and personal nature. It is not related to the
exchange or business activities of the SWX Group. Le pr=E9sent e-mail =
est
un message priv=E9 et personnel, sans rapport avec l'activit=E9 =
boursi=E8re du
Groupe SWX.

This message is for the named person's use only. It may contain
confidential, proprietary or legally privileged information. No
confidentiality or privilege is waived or lost by any mistransmission.
If you receive this message in error, please notify the sender urgently
and then immediately delete the message and any copies of it from your
system. Please also immediately destroy any hardcopies of the message.
You must not, directly or indirectly, use, disclose, distribute, print,
or copy any part of this message if you are not the intended recipient.
The sender's company reserves the right to monitor all e-mail
communications through their networks. Any views expressed in this
message are those of the individual sender, except where the message
states otherwise and the sender is authorised to state them to be the
views of the sender's company.=20


____________________________________________________________ __________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List modssl-users@modssl.org
Automated List Manager majordomo@modssl.org

Re: [ANNOUNCE] mod_ssl 2.8.18

am 27.05.2004 18:21:07 von Joe Orton

On Thu, May 27, 2004 at 05:09:17PM +0200, Boyle Owen wrote:
> > On Thu, May 27, 2004 at 15:21:37 +0200, Ralf S. Engelschall wrote:
> > > Changes with mod_ssl 2.8.18 (11-May-2004 to 27-May-2004)
> > >
> > > *) Fix buffer overflow in "SSLOptions +FakeBasicAuth"
> > implementation
> > > if the Subject-DN in the client certificate exceeds
> > 6KB in length.
> > > (CVE CAN-2004-0488).
> > >
> >
> > Is that also an issue in apache-2.x? (I wasn't able to find
> > that CVE, so I
> > ask here ;-)
>
> The problem was originally identified on apache2 (see
> http://www.securityfocus.com/bid/10355/) and it has already been patched
> there.

Anybody wanting to patch directly can fetch this:

http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/ssl/ssl_ engine_kernel.c?r1=1.105&r2=1.106

> Incidentally, AFAIK there is no vulnerability unless you are using
> "SSLOptions FakeBasicAuth". It's a fairly specialised option so my
> feeling is that this doesn't urgently affect a whole lot of people... Of
> course, you should still upgrade just in case some time in the future
> you do switch that option on.

And furthermore, you must trust a CA who will issue a client cert with
exploit code embedded in the subject DN.

Regards,

joe
____________________________________________________________ __________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List modssl-users@modssl.org
Automated List Manager majordomo@modssl.org

Re: [ANNOUNCE] mod_ssl 2.8.18

am 28.05.2004 19:47:24 von Udo Schweigert

On Thu, May 27, 2004 at 17:21:07 +0100, Joe Orton wrote:
> On Thu, May 27, 2004 at 05:09:17PM +0200, Boyle Owen wrote:
> >> On Thu, May 27, 2004 at 15:21:37 +0200, Ralf S. Engelschall wrote:
> > >> Changes with mod_ssl 2.8.18 (11-May-2004 to 27-May-2004)
> > >>=20
> > >> *) Fix buffer overflow in "SSLOptions +FakeBasicAuth"=20
> >> implementation
> > >> if the Subject-DN in the client certificate exceeds=20
> >> 6KB in length.
> > >> (CVE CAN-2004-0488).
> > >>=20
> >>=20
> >> Is that also an issue in apache-2.x? (I wasn't able to find=20
> >> that CVE, so I
> >> ask here ;-)
>>=20
>> The problem was originally identified on apache2 (see
>> http://www.securityfocus.com/bid/10355/) and it has already been patch=
ed
>> there.=20
>=20
> Anybody wanting to patch directly can fetch this:
>=20
> http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/ssl/ssl_ engine_kern=
el.c?r1=3D1.105&r2=3D1.106

Thanks, that was very helpful.


Best regards

Udo Schweigert
--
Udo Schweigert, Siemens AG | Voice : +49 89 636 42170
CT IC CERT, Siemens CERT | Fax : +49 89 636 41166
D-81730 München / Germany | email : Udo.Schweigert@siemens.com
____________________________________________________________ __________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List modssl-users@modssl.org
Automated List Manager majordomo@modssl.org