|
|
Subscribe / Log in / New account

Security

Changes in the TLS certificate ecosystem, part 1

November 11, 2015

This article was contributed by Hanno Böck

TLS certificates are the basis for most encrypted connections on the internet and for HTTPS in particular. This system, where certificate authorities issue certificates for a fee to associate the ownership of a domain with the key contained in the certificate, has gotten a bad reputation over the years. But a lot has changed recently to improve the security of the TLS certificate ecosystem. New technologies like HTTP Public Key Pinning and Certificate Transparency allow detecting and sometimes preventing the use of rogue certificates—and browser vendors have become much less willing to accept misbehavior by certificate authorities.

If one wants to get a feeling for what the situation was like just a few years ago it's worth watching a talk [YouTube] that Moxie Marlinspike gave at the Black Hat conference in 2011. Marlinspike starts his talk by reflecting about several incidents regarding the certificate authority Comodo. The company got attacked earlier that year and had issued bogus certificates for domains like www.google.com or addons.mozilla.org in an attack that presumably came from Iran. It wasn't only the incident itself that got experts like Marlinspike frustrated with Comodo, it was also the company's reaction. Public statements that downplayed the issue showed a severe lack of understanding of what was going on technically.

Although Comodo had endangered the secure connections for major internet services and it showed no ability to responsibly handle such issues, the incident had no major consequences for the company. It was often said that Comodo was "too big to fail". At that time, a quarter of the internet's HTTPS connections relied on Comodo certificates. It was unlikely that any browser vendor would take the step of removing the Comodo root certificates and declaring Comodo-signed certificates as untrusted.

It is no surprise that many people saw the whole system of certificate authorities as a big scam. Companies are taking money for the issuance of certificates, which are the basis for secure internet connections, but those companies had little accountability when problems arose. However a lot has changed in the past few years.

Certificate Transparency

One technology that is trying to improve the security of the certificate authority system is called Certificate Transparency and it was developed by Google.

The idea behind Certificate Transparency is to have public logs of certificates issued that can be verified and observed by everyone. All certificates are required to be submitted to those logs. Before a certificate authority issues a new certificate it would submit a pre-certificate, with almost the same information as the normal certificate, to the log. The only additional information that is added to the final certificate are signed certificate timestamps (SCT) from the logs that serve as a proof that the certificate has been logged. The logs use a structure called a Merkle hash tree that provides proof that the certificate has been added and allows others to check that the log is operating correctly.

Up until recently, Google required the support of Certificate Transparency for all Extended Validation certificates, which show a green bar with a company name in the Chrome browser. Those certificates require a more stringent check of the identity of the certificate owner. In the future, the plan is to require Certificate Transparency for all certificates in order to be accepted by the Chrome browser.

The basic idea of Certificate Transparency is that nobody can issue a certificate without making it public. Site operators can therefore regularly check the public logs to see whether they contain any certificates for their domains that they haven't requested themselves. That would be a red flag that something has gone awry.

A challenge remains to determine what happens when a browser cannot verify the validity of a certificate via the log. For example, if a log is offline or an attacker prevents the connection to the log, what should happen? Certificate Transparency explicitly does not try to prevent authorities from issuing bad certificates, it only tries to make sure that they are detectable. In that case that a browser sees a certificate that it cannot verify, a gossip protocol is planned for the browser to send information about that incident to other parties. However, the details of the gossip protocol still have to be worked out.

Symantec caught by transparency logs

Certificate Transparency recently played a crucial role in uncovering the issuance of rogue certificates by Symantec, which is Comodo's largest competitor in the certificate market. In a lot of ways, the issue was minor compared to what happened with Comodo a few years earlier, but was still serious. Symantec had issued a number of test certificates that were only valid for one day, but were logged, seemingly as part of the normal certificate-generation mechanism. Some of these were for Google domains. There is no evidence that any of these certificates were used in the wild and—at least if one believes Symantec's claims—the private key corresponding to these certificates never left its systems. The bad certificates were found by Google through the logs of the Certificate Transparency system.

Shortly after the incident, Symantec issued a blog post explaining the incident and announcing that the employees responsible for it had been terminated. Later, Symantec released a report [PDF] claiming that it found 76 certificates that had been issued in error.

Google wasn't happy with that report. Its own engineers were quickly able to identify more rogue certificates in the Certificate Transparency logs. Eventually, it turned out that Symantec had issued over 2,000 bad test certificates, many of them for domains that didn't exist. Since April 2014, the Baseline Requirements of the CA/Browser forum [PDF]—a rule set for the operation of certificate authorities—clearly forbids the creation of certificates for nonexistent domains.

"It's obviously concerning that a CA would have such a long-running issue and that they would be unable to assess its scope after being alerted to it and conducting an audit", Google engineer Ryan Sleevi wrote in a blog post following that discovery. In that post, Google demanded that all certificates issued by Symantec must support the Certificate Transparency system by June 1, 2016. Also Google demanded an independent third-party audit to investigate the incident, along with an explanation why the first investigation from Symantec didn't find the additional certificates that Google found within minutes by checking the Certificate Transparency logs. Google also made it clear that it would consider further actions if Symantec didn't comply with the requests.

The message Google sends out here is pretty clear: It won't accept behavior that endangers the security of the TLS ecosystem—and whoever behaves badly will face consequences.

The issuance of certificates for nonexistent or invalid domains has caused other certificate authorities to look for similar issues. Comodo engineer Rob Stradling reported that the company had found a couple of certificates issued for internal domain names and IP addresses. Among others, it had accidentally issued certificates for the names "help" and "mailarchive". Comodo had also found that other certificate authorities have published similar certificates.

CNNIC removed from browsers

Earlier this year Google and Mozilla showed that they were willing to remove certificate authorities from their browsers for misbehavior. The Chinese certificate authority CNNIC was caught issuing rogue certificates. CNNIC had issued a so-called intermediate certificate to the Egyptian company MCS. There it was used to intercept TLS traffic. Such TLS-interception proxies are controversial, but they are quite common in many enterprise firewall products. They are used to create and sign certificates on the fly and are therefore able to use man-in-the-middle attacks to inspect encrypted traffic. However, usually these devices create their own certificate roots that have to be manually installed into the users' browsers.

Using browser-accepted intermediate certificates for TLS interception is nothing new. In 2012, the company Trustwave has publicly admitted that it had sold an intermediate certificate to be used in an interception device. This spurred a hot debate on whether Trustwave should be removed from the Firefox browser. In the end it was allowed to stay, but browser vendors made it clear that they find the practice not to be acceptable.

When CNNIC was caught in 2015, the vendors were less forgiving. Shortly after the incident, both Chrome and Mozilla announced that they would not accept new certificates signed by CNNIC. They would still accept existing certificates signed by CNNIC until they expired, but they would refuse to accept any new certificates.

Replace or improve?

The core problem of the TLS certificate system is that there exist hundreds of certificate authorities. And unless extra protection measures are in place, each of those can create valid certificates for any domain. Therefore the whole system is only as strong as the weakest of all certificate authorities. In addition, that means there is no advantage for users to choose an especially trustworthy certificate authority.

These failures of certificate authorities in the past have spurred many proposals of how to replace the system of certificate authorities. However, none has been successful so far.

Marlinspike proposed a system called Covergence in 2011. The concept of Convergence was that several independent notaries would check whether they all see the same certificate for a domain. Through an indirection, the notaries wouldn't know who the user was. The general idea is that an attacker may be able to fool a user with a rogue certificate via a man-in-the-middle attack, but won't be able to fool all the notaries. However, that depends on the power of an attacker. If the attacker is positioned near the target server or has control over the internet routing system via the BGP protocol, a system like Convergence may be even less secure than the existing system.

In 2011 the Electronic Frontier Foundation outlined ideas for a system called Sovereign Keys. The basic building block was an endless log—similar to the Bitcoin blockchain—that would hold information about all certificates. Sovereign Keys was just a rough proposal and it was never implemented. Many saw it as too complex. However some of the ideas from Sovereign Keys were later incorporated into Certificate Transparency.

Another idea that has been on the table for a while is called DANE (DNS-based Authentication of Name Entities). The idea is to use DNS records protected by DNSSEC to provide information about certificates. The dependency on DNSSEC is DANE's biggest problem: DNSSEC has been around for a long time, but it hasn't been deployed at any relevant scale. While there has been some movement in deploying DNSSEC on the server side, the deployment on clients—which would be needed if it were be used to verify TLS certificates—is almost zero. And there are some serious doubts whether deployment on clients is feasible at all. Many IT security experts are skeptical about DNSSEC and doubt the system will ever gain widespread adoption.

While there have been plenty of calls to abolish the system of certificate authorities, all alternatives proposed until now have failed. It looks like certificate authorities are here to stay. The debate has therefore shifted to technologies that improve the current system. Next week, we will follow up with how HTTP Public Key Pinning can make the system of TLS certificates safer and what challenges remain in the certificate ecosystem.

Comments (15 posted)

Brief items

Security quotes of the week

In modern computing, the terms "software", "firmware", and "hardware" relate to the types of no you'll get when asking for security patches.
Jonathan Zdziarski (Thanks to Paul Wise.)

If we could trust userspace applications, we wouldn't need SELinux. But we assume that userspace code may be buggy, misconfigured or actively hostile, and we use technologies such as SELinux or AppArmor to restrict its behaviour. There's simply too much userspace code for us to guarantee that it's all correct, so we do our best to prevent it from doing harm anyway.

This is significantly less true in the kernel. The model up until now has largely been "Fix security bugs as we find them", an approach that fails on two levels:

1) Once we find them and fix them, there's still a window between the fixed version being available and it actually being deployed
2) The forces of good may not be the first ones to find them

This reactive approach is fine for a world where it's possible to push out software updates without having to perform extensive testing first, a world where the only people hunting for interesting kernel vulnerabilities are nice people. This isn't that world, and this approach isn't fine.

Matthew Garrett

We mentioned that the AES key is generated locally on the victim's computer. We looked into the way the key and initialization vector are generated by reverse-engineering the Linux.Encoder.1 sample in our lab. We realized that, rather than generating secure random keys and IVs, the sample would derive these two pieces of information from the libc rand() function seeded with the current system timestamp at the moment of encryption. This information can be easily retrieved by looking at the file's timestamp. This is a huge design flaw that allows retrieval of the AES key without having to decrypt it with the RSA public key sold by the Trojan's operator(s).
Bitdefender LABS finds a flaw in Linux "ransomware"

In my enormous to-read pile I've got "Why Johnny Still Can't Encrypt", and that's from fifteen years after the original paper on PGP's unusability was published. It's scary to think that companies like Apple have done more to protect us from intrusive government surveillance than nearly a quarter century of PGP has, because they've made it usable by the masses.
Peter Gutmann

Comments (1 posted)

The kernel of the argument (Washington Post)

Here's a lengthy Washington Post feature on the security (or lack thereof) of the Linux kernel; it features a number of familiar names. "Even many Linux enthusiasts see a problem with this from a security perspective: There is no systemic mechanism for identifying and remedying problems before hackers discover them, or for incorporating the latest advances in defensive technologies. And there is no chief security officer for the Linux kernel."

Comments (136 posted)

Linux Ransomware Debut Fails on Predictable Encryption Key (Bitdefender Labs)

Bitdefender Labs takes a look at Linux.Encoder.1 ransomware. "Linux.Encoder.1 is executed on the victim’s Linux box after remote attackers leverage a flaw in the popular Magento content management system app. Once executed, the Trojan looks for the /home, /root and /var/lib/mysql folders and starts encrypting their contents. Just like Windows-based ransomware, it encrypts the contents of these files using AES (a symmetric key encryption algorithm), which provides enough strength and speed while keeping system resources usage to a minimum. The symmetric key is then encrypted with an asymmetric encryption algorithm (RSA) and is prepended to the file, along with the initialization vector used by AES." Once the files are encrypted the hackers demand a fee in exchange for the RSA private key to decrypt the AES symmetric one. However, Bitdefender researchers were able to recover the AES key without having to decrypt it with the RSA private key. One can also thwart this threat with some good backups. (Thanks to Richard Moore)

Comments (134 posted)

New vulnerabilities

ipsilon: denial of service

Package(s):ipsilon CVE #(s):CVE-2015-5301
Created:November 9, 2015 Updated:November 11, 2015
Description: From the Red Hat bugzilla:

It was found that Ipsilon does not check whether a user is authorized to delete a service provider. This makes it possible for any authenticated user to delete any service provider, causing a denial of service.

Alerts:
Fedora FEDORA-2015-15290 ipsilon 2015-11-08
Fedora FEDORA-2015-15292 ipsilon 2015-11-08
Fedora FEDORA-2015-15291 ipsilon 2015-11-08

Comments (none posted)

kernel: multiple vulnerabilities

Package(s):kernel CVE #(s):CVE-2015-5307 CVE-2015-7833 CVE-2015-7990
Created:November 10, 2015 Updated:December 16, 2015
Description: From the Debian advisory:

CVE-2015-5307: Ben Serebrin from Google discovered a guest to host denial of service flaw affecting the KVM hypervisor. A malicious guest can trigger an infinite stream of "alignment check" (#AC) exceptions causing the processor microcode to enter an infinite loop where the core never receives another interrupt. This leads to a panic of the host kernel.

CVE-2015-7833: Sergej Schumilo, Hendrik Schwartke and Ralf Spenneberg discovered a flaw in the processing of certain USB device descriptors in the usbvision driver. An attacker with physical access to the system can use this flaw to crash the system.

CVE-2015-7990: It was discovered that the fix for CVE-2015-6937 was incomplete. A race condition when sending a message on unbound socket can still cause a NULL pointer dereference. A remote attacker might be able to cause a denial of service (crash) by sending a crafted packet.

Alerts:
Oracle ELSA-2016-2574 kernel 2016-11-10
openSUSE openSUSE-SU-2016:2649-1 kernel 2016-10-26
SUSE SUSE-SU-2016:2245-1 kernel 2016-09-06
openSUSE openSUSE-SU-2016:2184-1 kernel 2016-08-29
SUSE SUSE-SU-2016:2105-1 the Linux Kernel 2016-08-19
SUSE SUSE-SU-2016:2074-1 kernel 2016-08-15
SUSE SUSE-SU-2016:1985-1 kernel 2016-08-08
SUSE SUSE-SU-2016:1937-1 kernel 2016-08-02
SUSE SUSE-SU-2017:0333-1 kernel 2017-01-30
Mageia MGASA-2016-0233 kernel-tmb 2016-06-22
Mageia MGASA-2016-0232 kernel-linus 2016-06-22
openSUSE openSUSE-SU-2016:0301-1 kernel 2016-02-01
Debian DSA-3454-1 virtualbox 2016-01-27
Red Hat RHSA-2016:0046-01 kernel 2016-01-19
openSUSE openSUSE-SU-2016:0126-1 xen 2016-01-14
openSUSE openSUSE-SU-2016:0124-1 xen 2016-01-14
openSUSE openSUSE-SU-2016:0123-1 xen 2016-01-14
Mageia MGASA-2016-0015 kernel-tmb 2016-01-14
Mageia MGASA-2016-0014 kernel-linus 2016-01-14
Red Hat RHSA-2016:0024-01 kernel 2016-01-12
Oracle ELSA-2016-3503 kernel 2.6.32 2016-01-09
Oracle ELSA-2016-3503 kernel 2.6.32 2016-01-09
Oracle ELSA-2016-3502 kernel 2.6.39 2016-01-09
Oracle ELSA-2016-3502 kernel 2.6.39 2016-01-09
Red Hat RHSA-2016:0004-01 kernel 2016-01-07
SUSE SUSE-SU-2015:2350-1 kernel 2015-12-23
SUSE SUSE-SU-2015:2339-1 kernel 2015-12-22
Mageia MGASA-2016-0225 kernel 2016-06-13
Debian-LTS DLA-479-1 xen 2016-05-18
Ubuntu USN-2967-2 linux-ti-omap4 2016-05-09
Ubuntu USN-2967-1 kernel 2016-05-09
Ubuntu USN-2948-2 linux-lts-utopic 2016-04-11
Ubuntu USN-2947-3 linux-raspi2 2016-04-06
Ubuntu USN-2947-2 linux-lts-wily 2016-04-06
Ubuntu USN-2948-1 linux-lts-utopic 2016-04-06
Ubuntu USN-2947-1 kernel 2016-04-06
Ubuntu USN-2932-1 linux-lts-vivid 2016-03-14
Ubuntu USN-2929-2 linux-lts-trusty 2016-03-14
Ubuntu USN-2929-1 kernel 2016-03-14
SUSE SUSE-SU-2016:0658-1 Xen 2016-03-04
Mageia MGASA-2016-0098 xen 2016-03-07
SUSE SUSE-SU-2016:0354-1 kernel 2016-02-05
Scientific Linux SLSA-2015:2552-1 kernel 2015-12-21
SUSE SUSE-SU-2015:2292-1 kernel 2015-12-17
Debian DSA-3426-1 kernel 2015-12-17
openSUSE openSUSE-SU-2016:0318-1 kernel 2016-02-03
Ubuntu USN-2886-2 linux-ti-omap4 2016-02-01
Ubuntu USN-2890-3 linux-raspi2 2016-02-01
Ubuntu USN-2890-2 linux-lts-wily 2016-02-01
Ubuntu USN-2889-2 linux-lts-vivid 2016-02-01
Ubuntu USN-2888-1 linux-lts-utopic 2016-02-01
Ubuntu USN-2887-2 linux-lts-trusty 2016-02-01
Ubuntu USN-2886-1 kernel 2016-02-01
Ubuntu USN-2887-1 kernel 2016-02-01
Ubuntu USN-2889-1 kernel 2016-02-01
Ubuntu USN-2890-1 kernel 2016-02-01
Scientific Linux SLSA-2015:2636-1 kernel 2015-12-15
Oracle ELSA-2015-2636 kernel 2015-12-15
Fedora FEDORA-2015-c4ed00a68f kernel 2015-12-16
Fedora FEDORA-2015-ac9a19888e kernel 2015-12-16
Red Hat RHSA-2015:2645-01 kernel 2015-12-15
Red Hat RHSA-2015:2636-01 kernel 2015-12-15
Oracle ELSA-2015-3107 kernel x.y.z 2015-12-11
Oracle ELSA-2015-3107 kernel x.y.z 2015-12-11
openSUSE openSUSE-SU-2015:2250-1 xen 2015-12-10
openSUSE openSUSE-SU-2015:2249-1 xen 2015-12-10
Debian DSA-3414-1 xen 2015-12-09
Oracle ELSA-2015-2552 kernel 2015-12-08
openSUSE openSUSE-SU-2015:2232-1 kernel 2015-12-08
Red Hat RHSA-2015:2587-01 kernel 2015-12-09
Debian-LTS DLA-360-1 linux-2.6 2015-12-08
Red Hat RHSA-2015:2552-01 kernel 2015-12-08
SUSE SUSE-SU-2015:2194-1 kernel 2015-12-04
SUSE SUSE-SU-2015:2108-1 kernel 2015-11-26
Fedora FEDORA-2015-f150b2a8c8 xen 2015-11-20
Fedora FEDORA-2015-668d213dc3 xen 2015-11-21
Fedora FEDORA-2015-394835a3f6 xen 2015-11-23
Fedora FEDORA-2015-f2c534bc12 kernel 2015-11-20
Mageia MGASA-2015-0450 kernel 2015-11-19
Fedora FEDORA-2015-cd94ad8d7c kernel 2015-11-19
Fedora FEDORA-2015-115c302856 kernel 2015-11-19
Ubuntu USN-2807-1 linux-lts-wily 2015-11-10
Ubuntu USN-2806-1 linux-lts-vivid 2015-11-09
Ubuntu USN-2805-1 linux-lts-utopic 2015-11-09
Ubuntu USN-2804-1 linux-lts-trusty 2015-11-09
Ubuntu USN-2800-1 kernel 2015-11-09
Ubuntu USN-2801-1 kernel 2015-11-09
Ubuntu USN-2802-1 kernel 2015-11-09
Ubuntu USN-2803-1 kernel 2015-11-09
Debian DSA-3396-1 kernel 2015-11-10

Comments (none posted)

krb5: unspecified vulnerability

Package(s):krb5 CVE #(s):CVE-2015-2698
Created:November 9, 2015 Updated:December 28, 2015
Description: An unspecified vulnerability was fixed in krb5-1.13.2 and krb5-1.12.2.

From the Mageia advisory:

In any MIT krb5 release with the patches for CVE-2015-2696 applied, an application which calls gss_export_sec_context() may experience memory corruption if the context was established using the IAKERB mechanism. Historically, some vulnerabilities of this nature can be translated into remote code execution, though the necessary exploits must be tailored to the individual application and are usually quite complicated.

Alerts:
openSUSE openSUSE-SU-2015:2376-1 krb5 2015-12-27
Fedora FEDORA-2015-200d2dfd9f krb5 2015-11-24
openSUSE openSUSE-SU-2015:2055-1 krb5 2015-11-20
Fedora FEDORA-2015-1b9c33d713 krb5 2015-11-19
Mageia MGASA-2015-0446 krb5 2015-11-16
Ubuntu USN-2810-1 krb5 2015-11-12
Fedora FEDORA-2015-58ae075703 krb5 2015-11-08

Comments (none posted)

libebml: multiple vulnerabilities

Package(s):libebml CVE #(s):
Created:November 6, 2015 Updated:January 15, 2016
Description:

From the Mageia advisory:

In EbmlMaster::Read() in libebml before 1.3.3, when the parser encountered a deeply nested element with an infinite size then a following element of an upper level was not propagated correctly. Instead the element with the infinite size was added into the EBML element tree a second time resulting in memory access after freeing it and multiple attempts to free the same memory address during destruction (TALOS-CAN-0037).

In EbmlUnicodeString::UpdateFromUTF8() in libebml before 1.3.3, when reading from a UTF-8 string in which the length indicated by a UTF-8 character's first byte exceeds the string's actual number of bytes the parser would access beyond the end of the string resulting in a heap information leak (TALOS-CAN-0036).

Alerts:
openSUSE openSUSE-SU-2016:0125-1 libebml, libmatroska 2016-01-14
Mageia MGASA-2015-0430 libebml 2015-11-05

Comments (none posted)

libreoffice: multiple vulnerabilities

Package(s):libreoffice CVE #(s):CVE-2015-4551 CVE-2015-5212 CVE-2015-5213 CVE-2015-5214
Created:November 6, 2015 Updated:December 16, 2015
Description:

From the Debian advisory:

CVE-2015-4551 - Federico Scrinzi discovered an information leak in the handling of ODF documents. Quoting from https://www.libreoffice.org/about-us/security/advisories/cve-2015-4551/: "The LinkUpdateMode feature controls whether documents inserted into Writer or Calc via links will either not get updated, or prompt to update, or automatically update, when the parent document is loaded. The configuration of this option was stored in the document. That flawed approach enabled documents to be crafted with links to plausible targets on the victims host computer. The contents of those automatically inserted after load links can be concealed in hidden sections and retrieved by the attacker if the document is saved and returned to sender, or via http requests if the user has selected lower security settings for that document."

CVE-2015-5212 - A buffer overflow in parsing the printer setup information in ODF documents may result in the execution of arbitrary code.

CVE-2015-5213 / CVE-2015-5214 - A buffer overflow and an integer oect memory management in parsing Microsoft Word documents may result in the execution of arbitrary code.

Alerts:
Gentoo 201611-03 libreoffice 2016-11-04
Gentoo 201603-05 libreoffice 2016-03-09
openSUSE openSUSE-SU-2016:0588-1 LibreOffice 2016-02-26
Scientific Linux SLSA-2015:2619-1 libreoffice 2015-12-15
Oracle ELSA-2015-2619 libreoffice 2015-12-15
Oracle ELSA-2015-2619 libreoffice 2015-12-14
CentOS CESA-2015:2619 libreoffice 2015-12-14
CentOS CESA-2015:2619 libreoffice 2015-12-14
Red Hat RHSA-2015:2619-01 libreoffice 2015-12-14
Mageia MGASA-2015-0441 libreoffice 2015-11-10
Ubuntu USN-2793-1 libreoffice 2015-11-05
Debian DSA-3394-1 libreoffice 2015-11-05

Comments (none posted)

libxml2: denial of service

Package(s):libxml2 CVE #(s):CVE-2015-8035
Created:November 6, 2015 Updated:November 11, 2015
Description:

From the Mageia advisory:

A denial of service in libxml2 when parsing a specially crafted XML file if XZ support is enabled may cause applications to hang as the parsing never terminates.

Alerts:
Gentoo 201701-37 libxml2 2017-01-16
openSUSE openSUSE-SU-2016:0106-1 libxml2 2016-01-13
openSUSE openSUSE-SU-2015:2372-1 libxml2 2015-12-27
Debian DSA-3430-1 libxml2 2015-12-23
SUSE SUSE-SU-2016:0786-1 sles12-docker-image 2016-03-16
Fedora FEDORA-2016-a9ee80b01d mingw-libxml2 2016-02-17
Fedora FEDORA-2016-189a7bf68c mingw-libxml2 2016-02-17
Arch Linux ASA-201512-6 libxml2 2015-12-09
Fedora FEDORA-2015-037f844d3e libxml2 2015-11-30
Fedora FEDORA-2015-c24af963a2 libxml2 2015-11-26
Ubuntu USN-2812-1 libxml2 2015-11-16
Mageia MGASA-2015-0433 libxml2 2015-11-05

Comments (none posted)

libxslt: denial of service

Package(s):libxslt CVE #(s):CVE-2015-7995
Created:November 6, 2015 Updated:June 20, 2016
Description:

From the Mageia advisory:

A type confusion vulnerability in libxslt in xsltStylePreCompute() in preproc.c can lead to a denial of service.

Alerts:
Arch Linux ASA-201601-8 libxslt 2016-01-13
Debian DSA-3605-1 libxslt 2016-06-19
Debian-LTS DLA-514-1 libxslt 2016-06-12
Slackware SSA:2016-148-02 libxslt 2016-05-27
openSUSE openSUSE-SU-2016:1439-1 libxslt 2016-05-30
Mageia MGASA-2015-0432 libxslt 2015-11-05

Comments (none posted)

mediawiki: multiple vulnerabilities

Package(s):mediawiki CVE #(s):CVE-2015-8006 CVE-2015-8007 CVE-2015-8008 CVE-2015-8009
Created:November 6, 2015 Updated:November 11, 2015
Description:

From the CVE request:

CVE-2015-8006 - Extension:PageTriage - MediaWiki user Grunny discovered a DOM-based XSS in the way the extension handled page titles.

CVE-2015-8007 - Extension:Echo - Internal review discovered that Echo could display deleted or suppressed usernames when the username was previously used to Thank users.

CVE-2015-8008 - Extension:OAuth - Wikipedia user Sitic discovered that the OAuth extension did not correctly enforce the IP restrictions of a Consumer when using previously negotiated credentials.

CVE-2015-8009 - Extension:OAuth - Wikipedia user Sitic discovered that OAuth would accept a valid signature from any Consumer when checking the authorization signature. This allowed a registered Consumer who gained access to another Consumer's users' access tokens and secrets to use those credentials.

Alerts:
Fedora FEDORA-2015-24 mediawiki 2015-11-05
Fedora FEDORA-2015-ec6d598d3d mediawiki 2015-11-05
Fedora FEDORA-2015-97 mediawiki 2015-11-05

Comments (none posted)

mozilla: multiple vulnerabilities

Package(s):firefox nspr nss xulrunner seamonkey CVE #(s):CVE-2015-7185 CVE-2015-7186 CVE-2015-7190 CVE-2015-7191 CVE-2015-7192
Created:November 10, 2015 Updated:November 30, 2015
Description: From the CVE entries:

Mozilla Firefox before 42.0 on Android does not ensure that the address bar is restored upon fullscreen-mode exit, which allows remote attackers to spoof the address bar via crafted JavaScript code. (CVE-2015-7185)

Mozilla Firefox before 42.0 on Android allows user-assisted remote attackers to bypass the Same Origin Policy and trigger (1) a download or (2) cached profile-data reading via a file: URL in a saved HTML document. (CVE-2015-7186)

The Search feature in Mozilla Firefox before 42.0 on Android through 4.4 supports search-engine URL registration through an intent and can access this URL in a privileged context in conjunction with the crash reporter, which allows attackers to read log files and visit file: URLs of HTML documents via a crafted application. (CVE-2015-7190)

Mozilla Firefox before 42.0 on Android improperly restricts URL strings in intents, which allows attackers to conduct cross-site scripting (XSS) attacks via vectors involving an intent: URL and fallback navigation, aka "Universal XSS (UXSS)." (CVE-2015-7191)

The accessibility-tools feature in Mozilla Firefox before 42.0 on OS X improperly interacts with the implementation of the TABLE element, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using an NSAccessibilityIndexAttribute value to reference a row index. (CVE-2015-7192)

Alerts:
Gentoo 201512-10 firefox 2015-12-30
Fedora FEDORA-2015-8f34820159 seamonkey 2015-11-27
Slackware SSA:2015-318-01 seamonkey 2015-11-14
openSUSE openSUSE-SU-2015:1942-1 firefox, nspr, nss, xulrunner, seamonkey 2015-11-09

Comments (none posted)

owncloud: unspecified vulnerabilities

Package(s):owncloud CVE #(s):
Created:November 9, 2015 Updated:November 16, 2015
Description: From the Mageia advisory:

The owncloud package has been updated to version 8.0.9, which fixes undisclosed security issues and other bugs. See the ownCloud changelog for more information.

Alerts:
Fedora FEDORA-2015-a117082cd2 owncloud 2015-11-15
Fedora FEDORA-2015-85760004ca owncloud 2015-11-15
Fedora FEDORA-2015-a6be3a6810 owncloud 2015-11-15
Mageia MGASA-2015-0437 owncloud 2015-11-07

Comments (none posted)

php-horde-horde: cross-site request forgery

Package(s):php-horde-horde CVE #(s):
Created:November 5, 2015 Updated:November 11, 2015
Description: From the Red Hat bugzilla entry:

Multiple CSRF vulnerabilities on various admin pages were found and fixed in 5.2.11 version.

Upstream patch:

https://github.com/horde/horde/commit/a199d74932c902844514b2a83d21e7e221257dae

Alerts:
Debian DSA-3391-1 php-horde 2015-11-03
Fedora FEDORA-2015-a381facfd9 php-horde-passwd 2015-11-04
Fedora FEDORA-2015-37090f89d8 php-horde-passwd 2015-11-04
Fedora FEDORA-2015-a381facfd9 php-horde-ingo 2015-11-04
Fedora FEDORA-2015-37090f89d8 php-horde-ingo 2015-11-04
Fedora FEDORA-2015-a381facfd9 php-horde-imp 2015-11-04
Fedora FEDORA-2015-37090f89d8 php-horde-imp 2015-11-04
Fedora FEDORA-2015-a381facfd9 php-horde-horde 2015-11-04
Fedora FEDORA-2015-37090f89d8 php-horde-horde 2015-11-04

Comments (none posted)

putty: memory corruption

Package(s):putty CVE #(s):CVE-2015-5309
Created:November 11, 2015 Updated:December 2, 2015
Description: From the Mageia advisory:

Versions of PuTTY 0.54 and 0.65 inclusive have a potentially memory-corrupting integer overflow in the handling of the ECH (erase characters) control sequence in the terminal emulator.

Alerts:
Gentoo 201606-01 putty 2016-06-05
Fedora FEDORA-2015-5ad4a1f151 putty 2015-12-01
Fedora FEDORA-2015-3d17682c15 putty 2015-12-01
Debian DSA-3409-1 putty 2015-12-01
Debian-LTS DLA-347-1 putty 2015-11-24
openSUSE openSUSE-SU-2015:2023-1 putty 2015-11-18
Arch Linux ASA-201511-7 putty 2015-11-12
Mageia MGASA-2015-0442 putty 2015-11-10

Comments (none posted)

python-pycurl: use-after-free vulnerability

Package(s):python-pycurl CVE #(s):
Created:November 6, 2015 Updated:November 30, 2015
Description:

From the Red Hat bug report:

A use-after-free vulnerability was found in Curl object's HTTPPOST setopt when a Unicode value is passed as a value with a FORM_BUFFERPTR. The str object created from the passed in unicode object would have its buffer used but the unicode object would be stored instead of the str object.

Alerts:
Fedora FEDORA-2015-0de8163795 python-pycurl 2015-11-27
Mageia MGASA-2015-0440 python-curl 2015-11-10
Fedora FEDORA-2015-a26f0b0daf python-pycurl 2015-11-05

Comments (none posted)

sddm: denial of service

Package(s):sddm CVE #(s):CVE-2015-0856
Created:November 6, 2015 Updated:November 11, 2015
Description:

From the Mageia advisory:

Pavel Avgustinov discovered that SDDM does not disable the KDE crash handler, and certain themes would allow shell access to the sddm user as a result in case of a crash.

Alerts:
Fedora FEDORA-2015-9f996ea146 sddm 2015-11-13
Mageia MGASA-2015-0429 sddm 2015-11-05

Comments (none posted)

sudo: privilege escalation

Package(s):sudo CVE #(s):CVE-2015-5602
Created:November 9, 2015 Updated:June 27, 2016
Description: From the Red Hat bugzilla:

An unauthorized privilege escalation was found in sudoedit when a user is granted with root access to modify a particular file that could be located in a subset of directories. It seems that sudoedit does not check the full path if a wildcard is used twice (e.g. /home/*/*/file.txt), allowing a malicious user to replace the file.txt real file with a symbolic link to a different location (e.g. /etc/shadow), which results into unauthorized access. Affected versions are <= 1.8.14.

Alerts:
Gentoo 201606-13 sudo 2016-06-26
Debian-LTS DLA-382-1 sudo 2016-01-11
Debian DSA-3440-1 sudo 2016-01-11
Mageia MGASA-2015-0443 sudo 2015-11-10
Fedora FEDORA-2015-6a267387c0 sudo 2015-11-08
Fedora FEDORA-2015-386863df8a sudo 2015-11-08

Comments (none posted)

wpa: multiple vulnerabilities

Package(s):wpa CVE #(s):CVE-2015-5310 CVE-2015-5314 CVE-2015-5315 CVE-2015-5316
Created:November 11, 2015 Updated:November 11, 2015
Description: From the Debian advisory:

CVE-2015-5310: Jouni Malinen discovered a flaw in the WMM Sleep Mode Response frame processing. A remote attacker can take advantage of this flaw to mount a denial of service.

CVE-2015-5314 CVE-2015-5315: Jouni Malinen discovered a flaw in the handling of EAP-pwd messages which may result in a denial of service.

CVE-2015-5316: Jouni Malinen discovered a flaw in the handling of EAP-pwd Confirm messages which may result in a denial of service.

Alerts:
openSUSE openSUSE-SU-2016:2357-1 wpa_supplicant 2016-09-23
Ubuntu USN-2808-1 wpa 2015-11-10
Debian DSA-3397-1 wpa 2015-11-10

Comments (none posted)

xen: multiple vulnerabilities

Package(s):xen CVE #(s):CVE-2015-7970 CVE-2015-7813 CVE-2015-7814 CVE-2015-7812 CVE-2015-7972
Created:November 9, 2015 Updated:November 11, 2015
Description: From the CVE entries:

The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand. (CVE-2015-7970)

Xen 4.4.x, 4.5.x, and 4.6.x does not limit the number of printk console messages when reporting unimplemented hypercalls, which allows local guests to cause a denial of service via a sequence of (1) HYPERVISOR_physdev_op hypercalls, which are not properly handled in the do_physdev_op function in arch/arm/physdev.c, or (2) HYPERVISOR_hvm_op hypercalls, which are not properly handled in the do_hvm_op function in arch/arm/hvm.c. (CVE-2015-7813)

Race condition in the relinquish_memory function in arch/arm/domain.c in Xen 4.6.x and earlier allows local domains with partial management control to cause a denial of service (host crash) via vectors involving the destruction of a domain and using XENMEM_decrease_reservation to reduce the memory of the domain. (CVE-2015-7814)

The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure." (CVE-2015-7972)

From the Red Hat bugzilla:

A vulnerability allowing malicious guest to crash the host was found. Early versions of Xen on ARM did not support "multicall" functionality (the ability to perform multiple operations via a single hypercall) and therefore stubbed out the functionality needed to support preemption of multicalls in a manner which crashed the host. When multicall support was subsequently added these stubs were not replaced with the correct functionality and therefore exposed to guests a code path which crashes the host. Any guest can issue a preemptable hypercall via the multicall interface to exploit this vulnerability. Both 32- and 64-bit ARM systems are vulnerable from Xen 4.4 onward. (CVE-2015-7812)

Alerts:
openSUSE openSUSE-SU-2016:0124-1 xen 2016-01-14
Debian-LTS DLA-479-1 xen 2016-05-18
Gentoo 201604-03 xen 2016-04-05
Mageia MGASA-2016-0098 xen 2016-03-07
openSUSE openSUSE-SU-2015:2250-1 xen 2015-12-10
openSUSE openSUSE-SU-2015:2249-1 xen 2015-12-10
Debian DSA-3414-1 xen 2015-12-09
openSUSE openSUSE-SU-2015:2003-1 xen 2015-11-17
openSUSE openSUSE-SU-2015:1965-1 xen 2015-11-12
openSUSE openSUSE-SU-2015:1964-1 xen 2015-11-12
Fedora FEDORA-2015-242be2c240 xen 2015-11-10
Fedora FEDORA-2015-6f6b79efe2 xen 2015-11-10
Fedora FEDORA-2015-a931b02be2 xen 2015-11-08

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2015, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds