|
|
Log in / Subscribe / Register

Security

The trouble with new TLS version numbers

September 28, 2016

This article was contributed by Hanno Böck

The TLS working group in the IETF is currently working on the next version of the encryption protocol: TLS 1.3. The new protocol will bring performance improvements by avoiding round trips and will deprecate a lot of dangerous cryptographic constructions. But, apart from technical improvements, it will also bring something that may seem trivial, but that could cause a lot of trouble: a new version number. That will probably lead to a redesign of the TLS version-negotiation mechanism.

When a new version of a protocol gets introduced, there must be some mechanism to keep compatibility with existing implementations. Not everyone will move to TLS 1.3; many legacy implementations will keep using TLS 1.2 or older versions for years to come.

TLS uses a version mechanism that may seem relatively simple, but it has been the source of a surprising number of problems. When a client connects to a server, it sends the highest version number it supports in the ClientHello message. The server can reply with any version equal or lower than that. Therefore, if a client connects to a server with a maximum version number of 1.2 and the server only supports TLS 1.0, it will answer with that version. As long as the client still has compatibility for TLS 1.0, a successful connection can be established.

This ideal case often doesn't occur, however, due to faulty server implementations. Many servers simply fail once one tries to connect with a higher TLS version than they support. The failure can happen in a variety of ways. Some servers terminate the connection on a TCP level or send a TLS error alert, others simply wait until a timeout happens. Some also successfully send a TLS ServerHello and almost complete a handshake, but fail later during verification of the FinishedMessage, which is the last part of the handshake. All these behaviors are bugs in the server software.

Version intolerance

This problem is known as "version intolerance" and it has cropped up every time browsers and TLS implementations have introduced new protocol versions. An old web page documents the problem; it was written by Netscape in 2003 and can be found in the Mozilla wiki. Most of the affected devices were enterprise TLS appliances, although occasionally free implementations like OpenSSL were also affected.

Browser vendors have reacted to these problems with a questionable strategy: after a connection failure, the browser tries to reconnect with a lower TLS or SSL version. Back then, the only versions in widespread use were SSL 3 and TLS 1.0. While this avoided problems with broken servers, it introduced another problem: these downgrades occasionally happened because of dropped packets due to bad network connections. Therefore protocol features that were only supported in TLS 1.0 stopped working on an irregular basis.

One extension that TLS 1.0 introduced is called Server Name Indication (SNI) and it removed a limitation of the old SSL protocol, by allowing multiple domains with different certificates to be hosted on the same IP address. SNI allows shared hosting services that often host hundreds of websites on the same IP to deploy HTTPS. The deployment of SNI was severely hampered by the browser's version fallbacks in TLS, because randomly website visitors would see the wrong certificate due to a connection downgrade to SSL 3.

The version fallbacks also introduced security issues. If browsers try to reconnect with a lower TLS or SSL version, then a man-in-the-middle attacker can force these version downgrades by blocking ClientHello messages with higher version numbers. At the Black Hat USA conference in 2014, Antoine Delignat-Lavaud presented an attack called "virtual host confusion" (YouTube video, paper [PDF]). The attack exploited the fact that an attacker can disable SNI by a forced version downgrade.

Later that year, Bodo Möller, Thai Duong, and Krzysztof Kotowicz discovered the POODLE attack — a padding oracle attack that exploits the fact that in SSL 3 the padding of the encryption was undefined and could have any value. But that alone wouldn't have been very interesting, because at that time SSL 3 was rarely used. In combination with version fallbacks, however, POODLE became a severe issue because almost all servers and clients still supported SSL 3. With version downgrades it was easy to force a connection to use the old protocol. The POODLE paper introduced the term "protocol downgrade dance" for the downgrade behavior of browsers.

In response to these kinds of problems, a mechanism called "Signaling Cipher Suite Value" (SCSV) was introduced. By including a special cipher suite value, servers could signal to clients that they weren't defective, thus if a connection used a version downgrade it shouldn't be established. SCSV got standardized as RFC 7507, but it quickly became almost obsolete, because browser vendors decided that they could get rid of the questionable version fallbacks entirely.

SCSV is notable, though, because it is a feature for the TLS standard that exists solely to work around buggy implementations. But it's not the only such feature. Some devices from the company F5 fail to allow connections if a handshake has a size between 256 and 512 bytes. Therefore a padding extension was introduced that simply expands the handshake to avoid those sizes. However, it later turned out that this solution would cause other implementations to fail, because they don't accept handshakes larger than 512 bytes.

The return of fallbacks

Despite all the drama version fallbacks have caused, they may make a comeback. In a recent blog post, Google developer Adam Langley commented:

It's taken about 15 years to get to the point where web browsers don't have to work around broken version negotiation in TLS and that's mostly because we only have three active versions of TLS. When we try to add a fourth (TLS 1.3) in the next year, we'll have to add back the workaround, no doubt.

Langley was certain that there is no way to avoid TLS version fallbacks when TLS 1.3 gets introduced. The reason is that currently about three percent of the major web pages have problems with TLS 1.3 handshakes. In theory, browser vendors could skip the fallbacks and simply break non-compliant sites, however that's unlikely to happen. A browser that breaks a large number of sites and devices will likely face a backlash from users and may push those users to choose another browser. Chrome has often faced heavy criticism from users when it deprecated insecure mechanisms in the past. When Google deprecated insecure Diffie-Hellman parameters, it broke connections to a Cisco RV042G router. While it is obvious that Cisco was at fault here, the user reactions that can be seen in Chrome's public forum blamed Google for its effort to make the Internet more secure.

TLS 1.3 contains a mechanism similar to SCSV that could avoid the worst consequences of version intolerance. By sending a specific value in the random number field of the handshake, a server can indicate that it doesn't want downgraded connections. Still this is far from ideal, as it adds another layer of complexity. Ideally vendors should just fix their TLS implementations.

Vendor responses

The vendors responsible for broken version negotiations mostly don't seem to care a lot. I have tried to identify affected vendors. Many of the buggy web pages use Citrix Netscaler devices. Citrix has informed me that it is aware of this problem, although it doesn't consider it to be a security issue. Citrix was unable to give any timeline on when this bug will be fixed.

Several products from IBM, among them IBM HTTP Server and Lotus Domino, are also affected. At first IBM security simply denied that there is a problem and claimed that the issue was already fixed in the current HTTP Server release. After informing them that I actually tested with the latest release and that it is still affected, the company looked into it. IBM informed me that it doesn't treat the issue as a security vulnerability. IBM was unable to give a concrete timeline when a fix will be available, but informed me that it will likely happen with the next version of its TLS implementation, GSKit, which will be released by the end of the year. A while later, IBM went back into denial mode and informed me that the issue was closed, because the company was unable to reproduce it — after it already confirmed that it was working on a fix.

So two major vendors didn't consider this issue a security vulnerability and didn't see any urgency to tackle it. While it is true that this issue itself doesn't cause a security problem for its device owner,past experience has shown that down the line these bugs can cause security issues, because they force client implementations to implement dangerous behavior.

The third vendor that could be identified was Cisco and version intolerance affects their ACE load-balancer devices. These devices are out of support and no longer receive updates. It was made clear to me that Cisco won't consider any exceptions to its end-of-life policy. So people who still use these devices will have to live with this bug, with no way of fixing it. Cisco did promise to verify whether devices that are still supported are also affected by this bug. As the software of these devices is proprietary, there is no way for users to fix these bugs themselves.

I also tried to contact operators of major affected web pages, but with limited success. The most notable web pages that fail with a TLS 1.3 handshake are apple.com, ebay.com, and various localized versions of PayPal. In many cases, only connections without a leading www are affected. The reason for that is probably that the www version of a site is often transferred to a content delivery network, while the domain without www is delivered by another device that simply forwards connections.

Apple and eBay didn't answer questions about their version intolerant web services; both sites are still affected. PayPal simply said that TLS issues aren't covered by their bug bounty program, but refused to discuss the issue any further.

Server operators can test their server for TLS version intolerance with the SSL Labs test or with the testssl.sh tool. Both tests have limitations and don't catch all instances of version intolerance. The most reliable way to test right now is to use the Beta or Dev channel release of Chrome and manually enable TLS 1.3 (via chrome://flags option "Maximum TLS version enabled") or use Firefox Nightly (set "security.tls.version.max" and "security.tls.version.fallback-limit" to "4" in about:config). Trying to access version intolerant sites that usually support HTTPS will result in a connection failure.

Rethinking version negotiation

Given the situation, Google developer David Benjamin proposed a different route with a redesign of the whole version negotiation mechanism. He suggested that the version could be negotiated with an extension that sends a list of supported newer versions. Obviously the same problem with version intolerance could happen again with such a solution in the future: servers may simply not work if they see any version in the extension that they don't know.

To avoid this, Benjamin proposed that browsers could randomly send bogus version numbers that get reserved with a guarantee that they will never be used for any real TLS version. Any correct implementation should just ignore all unsupported version values. Bugs in servers that fail when they see a version number they don't support would likely be discovered much earlier, so they probably will never make it into production releases. It is still possible that vendors could implement this in the wrong way by just ignoring the reserved bogus version numbers. However, it is hardly imaginable that one does so without outright trying to create non-compliant software.

Benjamin also proposed a generalized variant of this mechanism under the name Generate Random Extensions And Sustain Extensibility (GREASE). The same way that bogus version numbers are sent could be used for extensions and cipher suites to avoid bugs in those areas.

The proposal for a TLS version negotiation via an extension was received with skepticism during the last IETF conference in Berlin. It would further complicate an already complicated handshake. The existing ClientHello already contains two version numbers, the TLS record layer version and the real ClientHello version. The TLS record layer version never had any real meaning, so most implementations simply set it to the version value of TLS 1.0 and ignore it. TLS 1.3 will make this official and says that it must be ignored. What further adds to confusion is that the version numbers sent over the wire don't match the version numbers of the protocol. For historic reasons — all versions of TLS came after SSL version 3 — TLS 1.0 is indicated with the value pair {3, 1}, TLS 1.3 will be {3, 4}.

The TLS community was therefore uneasy with the idea of adding another layer of complexity. But Benjamin's latest proposal got more support on the mailing list than during the IETF conference. It has now the status of a rough consensus and will most likely be part of TLS 1.3.

The GREASE strategy is an interesting new paradigm for designing protocols in an ecosystem where many vendors ship low-quality products that implement specifications incorrectly. There is a need to stay compatible with an existing infrastructure of defective devices. Similar strategies have been used in other cases. HTTP/2, for example, is not negotiated over a normal HTTP request, instead an extension mechanism for TLS called Application-Layer Protocol Negotiation (ALPN) is used to negotiate the higher version.

David Benjamin's GREASE concept goes one step further and tries anticipate potential failures. He has tried to design a protocol where bugs will show up before products are shipped. It'll be interesting to see whether this leads to a less fragile TLS ecosystem.

Comments (5 posted)

Brief items

Security quotes of the week

John Gilmore, an American entrepreneur and civil libertarian, once famously quipped that “the Internet interprets censorship as damage and routes around it.” This notion undoubtedly rings true for those who see national governments as the principal threats to free speech.

However, events of the past week have convinced me that one of the fastest-growing censorship threats on the Internet today comes not from nation-states, but from super-empowered individuals who have been quietly building extremely potent cyber weapons with transnational reach.

More than 20 years after Gilmore first coined that turn of phrase, his most notable quotable has effectively been inverted — “Censorship can in fact route around the Internet.” The Internet can’t route around censorship when the censorship is all-pervasive and armed with, for all practical purposes, near-infinite reach and capacity. I call this rather unwelcome and hostile development the “The Democratization of Censorship.”

Brian Krebs

Instead, the attacks against KrebsOnSecurity harness so-called Internet-of-things devices—think home routers, webcams, digital video recorders, and other everyday appliances that have Internet capabilities built into them. Manufacturers design these devices to be as inexpensive and easy-to-use as possible. Consumers often have little technical skill. As a result, the devices frequently come with bug-ridden firmware that never gets updated and easy-to-guess login credentials that never get changed. Their lax security and always-connected status makes the devices easy to remotely commandeer by people who turn them into digital cannons that spray the Internet with shrapnel.
Dan Goodin

The RecentFiles object gives access to the history of recent documents. Most users, unless they just installed Word, are going to have opened more than two documents. However, on a testing virtual machine (VM), the software is normally not "broken in". When the VM is initially created, software is installed, maybe opened once or twice to make sure it works, and then the state is saved and every time a test needs to be made, that state is loaded again. These VM images may then be used in automated analysis and testing tools which execute malware and see how they behave. If malware can be smart enough to know when it's being tested in a VM, it can avoid doing anything suspicious or malicious and thereby increase the time it takes to be detected by such tools.
Caleb Fenton

Comments (6 posted)

OpenSSL security advisory for September 26

This OpenSSL security advisory is notable in that it's the second one in four days; sites that updated after the first one may need to do so again. "This security update addresses issues that were caused by patches included in our previous security update, released on 22nd September 2016. Given the Critical severity of one of these flaws we have chosen to release this advisory immediately to prevent upgrades to the affected version, rather than delaying in order to provide our usual public pre-notification."

Comments (12 posted)

New vulnerabilities

bash: code execution

Package(s):bash CVE #(s):CVE-2016-0634
Created:September 26, 2016 Updated:December 13, 2016
Description: From the Red Hat bugzilla:

A vulnerability was found in a way bash expands the $HOSTNAME. Injecting the hostname with malicious code would cause it to run each time bash expanded \h in the prompt string.

Alerts:
openSUSE openSUSE-SU-2016:2715-1 bash 2016-11-03
Fedora FEDORA-2016-62e6c462ef bash 2016-09-25
Fedora FEDORA-2016-a822b472c4 bash 2016-09-23
Gentoo 201612-39 bash 2016-12-13
openSUSE openSUSE-SU-2016:2961-1 bash 2016-12-01
Mageia MGASA-2016-0393 bash 2016-11-21

Comments (3 posted)

bind: denial of service

Package(s):bind CVE #(s):CVE-2016-2776
Created:September 28, 2016 Updated:October 25, 2016
Description: From the CVE entry:

buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.

Alerts:
Fedora FEDORA-2016-cbef6c8619 bind99 2016-10-24
Fedora FEDORA-2016-3af8b344f1 bind 2016-10-24
Red Hat RHSA-2016:2099-01 bind 2016-10-25
Oracle ELSA-2016-2094 bind97 2016-10-21
Oracle ELSA-2016-2093 bind 2016-10-21
Gentoo 201610-07 bind 2016-10-11
Debian-LTS DLA-645-1 bind9 2016-10-05
Mageia MGASA-2016-0332 bind 2016-10-04
Fedora FEDORA-2016-cca77daf70 bind99 2016-10-03
Fedora FEDORA-2016-2d9825f7c1 bind 2016-10-01
Scientific Linux SLSA-2016:1945-1 bind97 2016-09-28
Scientific Linux SLSA-2016:1944-1 bind 2016-09-28
Oracle ELSA-2016-1945 bind97 2016-09-28
Oracle ELSA-2016-1944 bind 2016-09-28
Oracle ELSA-2016-1944 bind 2016-09-28
Oracle ELSA-2016-1944 bind 2016-09-28
CentOS CESA-2016:1945 bind97 2016-09-28
CentOS CESA-2016:1944 bind 2016-09-28
CentOS CESA-2016:1944 bind 2016-09-28
CentOS CESA-2016:1944 bind 2016-09-28
Ubuntu USN-3088-1 bind9 2016-09-27
SUSE SUSE-SU-2016:2405-1 bind 2016-09-27
SUSE SUSE-SU-2016:2401-1 bind 2016-09-27
SUSE SUSE-SU-2016:2399-1 bind 2016-09-27
Slackware SSA:2016-271-01 bind 2016-09-27
openSUSE openSUSE-SU-2016:2406-1 bind 2016-09-28
Debian DSA-3680-1 bind9 2016-09-27
Arch Linux ASA-201609-29 bind 2016-09-27
Red Hat RHSA-2016:1945-01 bind97 2016-09-28
Red Hat RHSA-2016:1944-01 bind 2016-09-28

Comments (none posted)

drupal7-google_analytics: cross-site scripting

Package(s):drupal7-google_analytics CVE #(s):
Created:September 22, 2016 Updated:September 28, 2016
Description: The drupal "Google Analytics" module suffers from a cross-site scripting vulnerability. See this advisory for details. "This vulnerability is mitigated by the fact that an attacker must have a role with the permission 'Administer Google Analytics'."
Alerts:
Fedora FEDORA-2016-a3cc693fba drupal7-google_analytics 2016-09-21
Fedora FEDORA-2016-df1252db90 drupal7-google_analytics 2016-09-22

Comments (none posted)

drupal panels: multiple vulnerabilities

Package(s):drupal7-panels CVE #(s):
Created:September 22, 2016 Updated:September 28, 2016
Description: The Drupal "Panels" contrib module suffers from multiple "critical" vulnerabilities. "Much of the functionality to modify these panels rely on backend routes that call administrative forms. These forms did not provide any access checks, or site specific encoded urls. This can allow an attacker to guess the backend url as an anonymous user and see data loaded for the form."
Alerts:
Fedora FEDORA-2016-703a5e621c drupal7-panels 2016-09-21
Fedora FEDORA-2016-c01e32e071 drupal7-panels 2016-09-22

Comments (none posted)

dwarfutils: two vulnerabilities

Package(s):dwarfutils CVE #(s):CVE-2016-7510 CVE-2016-7511
Created:September 26, 2016 Updated:October 10, 2016
Description: From the Debian LTS advisory:

It was discovered that there were out-of-bounds read issues in dwarfutils, a library to consume and produce DWARF debug information.

Alerts:
Fedora FEDORA-2016-328754be1c libdwarf 2016-10-09
Debian-LTS DLA-635-1 dwarfutils 2016-09-24
Arch Linux ASA-201612-4 libdwarf 2016-12-04

Comments (none posted)

firefox: multiple vulnerabilities

Package(s):firefox CVE #(s):CVE-2016-5256 CVE-2016-5271 CVE-2016-5273 CVE-2016-5275 CVE-2016-5279 CVE-2016-5282 CVE-2016-5283
Created:September 22, 2016 Updated:September 28, 2016
Description: Among the many vulnerabilities fixed in the firefox 49 release are CVE-2016-5256 (memory corruption bugs), CVE-2016-5271 (information disclosure), CVE-2016-5273 (code execution), CVE-2016-5275 (code execution), CVE-2016-5279 (information disclosure), CVE-2016-5282 (loading of favicons via non-whitelisted protocols), and CVE-2016-5283 (information disclosure).
Alerts:
openSUSE openSUSE-SU-2016:2386-1 firefox, nss 2016-09-26
Fedora FEDORA-2016-a6672dbd40 firefox 2016-09-25
Fedora FEDORA-2016-de277b9183 firefox 2016-09-25
openSUSE openSUSE-SU-2016:2368-1 firefox, nss 2016-09-24
Ubuntu USN-3076-1 firefox 2016-09-22
Arch Linux ASA-201609-22 firefox 2016-09-22
Mageia MGASA-2017-0059 iceape 2017-02-20
Gentoo 201701-15 firefox thunderbird 2017-01-04
Gentoo 201701-15 firefox 2017-01-03

Comments (none posted)

freerdp: denial of service

Package(s):freerdp CVE #(s):CVE-2013-4118
Created:September 28, 2016 Updated:October 4, 2016
Description: From the openSUSE advisory:

Add a NULL pointer check to fix a server crash. See the openSUSE bug report for more information.

Alerts:
Mageia MGASA-2016-0331 freerdp 2016-10-04
openSUSE openSUSE-SU-2016:2400-1 freerdp 2016-09-27
openSUSE openSUSE-SU-2016:2402-1 freerdp 2016-09-27

Comments (none posted)

Horde: cross-site scripting

Package(s):php-horde-Horde-Mime-Viewer CVE #(s):
Created:September 22, 2016 Updated:September 28, 2016
Description: According to this commit, Horde renders SVG images in the browser in a way that is subject to cross-site scripting attacks.
Alerts:
Fedora FEDORA-2016-a506d298bf php-horde-Horde-Mime-Viewer 2016-09-21
Fedora FEDORA-2016-d9fc52c251 php-horde-Horde-Mime-Viewer 2016-09-22

Comments (none posted)

Horde: cross-site scripting

Package(s):php-horde-Horde-Text-Filter CVE #(s):
Created:September 22, 2016 Updated:September 28, 2016
Description: According to the Red Hat bug tracker, Horde suffers from a "possible XSS vulnerability with data:html and form action was found in Text Filter".
Alerts:
Fedora FEDORA-2016-084620f386 php-horde-Horde-Text-Filter 2016-09-21
Fedora FEDORA-2016-58bc2a649a php-horde-Horde-Text-Filter 2016-09-22

Comments (none posted)

imagemagick: code execution

Package(s):imagemagick CVE #(s):
Created:September 26, 2016 Updated:September 28, 2016
Description: From the Debian advisory:

This updates fixes several vulnerabilities in imagemagick: Various memory handling problems and cases of missing or incomplete input sanitising may result in denial of service or the execution of arbitrary code if malformed SIXEL, PDB, MAP, SGI, TIFF and CALS files are processed.

Alerts:
Debian DSA-3675-1 imagemagick 2016-09-23

Comments (none posted)

irssi: heap corruption

Package(s):irssi CVE #(s):CVE-2016-7045 CVE-2016-7044
Created:September 22, 2016 Updated:October 11, 2016
Description: According to the irssi advisory, a missing length check can cause a range of memory to be overwritten. Evidently, only zeroes can be written, so opinions differ on whether this vulnerability is exploitable for code execution.
Alerts:
openSUSE openSUSE-SU-2016:2524-1 irssi 2016-10-13
Fedora FEDORA-2016-0551065fe0 irssi 2016-10-11
Fedora FEDORA-2016-a64716084e irssi 2016-10-10
Ubuntu USN-3086-1 irssi 2016-09-21
Slackware SSA:2016-265-03 irssi 2016-09-21
Debian DSA-3672-1 irssi 2016-09-21
Arch Linux ASA-201609-20 irssi 2016-09-22

Comments (none posted)

mactelnet: code execution

Package(s):mactelnet CVE #(s):CVE-2016-7115
Created:September 26, 2016 Updated:September 28, 2016
Description: From the CVE entry:

Buffer overflow in the handle_packet function in mactelnet.c in the client in MAC-Telnet 0.4.3 and earlier allows remote TELNET servers to execute arbitrary code via a long string in an MT_CPTYPE_ENCRYPTIONKEY control packet.

Alerts:
Debian-LTS DLA-639-1 mactelnet 2016-09-25

Comments (none posted)

mod_cluster: "remote exploits"

Package(s):mod_cluster CVE #(s):
Created:September 22, 2016 Updated:September 28, 2016
Description: The Fedora advisory says: "Fixed remote exploits in Apache HTTP Server mod_manager and mod_proxy_cluster modules". Further information appears to be unavailable.
Alerts:
Fedora FEDORA-2016-249e92f700 mod_cluster 2016-09-22

Comments (none posted)

mozilla: denial of service

Package(s):firefox, nss CVE #(s):CVE-2016-2827
Created:September 26, 2016 Updated:September 28, 2016
Description: From the CVE entry:

The mozilla::net::IsValidReferrerPolicy function in Mozilla Firefox before 49.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a Content Security Policy (CSP) referrer directive with zero values.

Alerts:
openSUSE openSUSE-SU-2016:2386-1 firefox, nss 2016-09-26
openSUSE openSUSE-SU-2016:2368-1 firefox, nss 2016-09-24
Mageia MGASA-2017-0059 iceape 2017-02-20
Gentoo 201701-15 firefox thunderbird 2017-01-04
Gentoo 201701-15 firefox 2017-01-03

Comments (none posted)

openssl: multiple vulnerabilities

Package(s):openssl CVE #(s):CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2180 CVE-2016-2181 CVE-2016-2182 CVE-2016-2183 CVE-2016-6302 CVE-2016-6303 CVE-2016-6304 CVE-2016-6305 CVE-2016-6306
Created:September 22, 2016 Updated:January 23, 2017
Description: The September 22 2016 OpenSSL advisory lists a number of problems fixed in the 1.1.0a, 1.0.2i, and 1.0.1u releases. The most serious would appear to be CVE-2016-6305, a "moderate" denial-of-service vulnerability.
Alerts:
Red Hat RHSA-2016:2802-01 openssl 2016-11-17
openSUSE openSUSE-SU-2016:2788-1 mysql-community-server 2016-11-12
openSUSE openSUSE-SU-2016:2769-1 mysql-community-server 2016-11-10
SUSE SUSE-SU-2016:2470-2 nodejs4 2016-11-01
Oracle ELSA-2016-3627 openssl 2016-10-14
openSUSE openSUSE-SU-2016:2537-1 compat-openssl098 2016-10-14
openSUSE openSUSE-SU-2016:2496-1 nodejs 2016-10-11
Mageia MGASA-2016-0338 openssl 2016-10-12
Fedora FEDORA-2016-97454404fe openssl 2016-10-11
SUSE SUSE-SU-2016:2469-1 openssl1 2016-10-06
SUSE SUSE-SU-2016:2470-1 nodejs4 2016-10-06
SUSE SUSE-SU-2016:2468-1 compat-openssl098 2016-10-06
SUSE SUSE-SU-2016:2458-1 openssl 2016-10-05
Scientific Linux SLSA-2016:1940-1 openssl 2016-09-28
CentOS CESA-2016:1940 openssl 2016-09-29
CentOS CESA-2016:1940 openssl 2016-09-28
SUSE SUSE-SU-2016:2394-1 openssl 2016-09-27
Oracle ELSA-2016-1940 openssl 2016-09-27
Oracle ELSA-2016-1940 openssl 2016-09-27
openSUSE openSUSE-SU-2016:2407-1 openssl 2016-09-28
Fedora FEDORA-2016-a555159613 openssl 2016-09-28
SUSE SUSE-SU-2016:2387-1 openssl 2016-09-26
openSUSE openSUSE-SU-2016:2391-1 openssl 2016-09-27
Arch Linux ASA-201609-23 openssl 2016-09-26
Arch Linux ASA-201609-24 lib32-openssl 2016-09-26
Red Hat RHSA-2016:1940-01 openssl 2016-09-27
Ubuntu USN-3087-2 openssl 2016-09-23
Debian-LTS DLA-637-1 openssl 2016-09-25
Debian DSA-3673-2 openssl 2016-09-23
Slackware SSA:2016-266-01 openssl 2016-09-22
Ubuntu USN-3087-1 openssl 2016-09-22
Debian DSA-3673-1 openssl 2016-09-22
openSUSE openSUSE-SU-2017:0513-1 java-1_7_0-openjdk 2017-02-19
SUSE SUSE-SU-2017:0490-1 java-1_7_0-openjdk 2017-02-17
Ubuntu USN-3198-1 openjdk-6 2017-02-15
SUSE SUSE-SU-2017:0460-1 java-1_8_0-ibm 2017-02-14
CentOS CESA-2017:0269 java-1.7.0-openjdk 2017-02-13
CentOS CESA-2017:0269 java-1.7.0-openjdk 2017-02-13
CentOS CESA-2017:0269 java-1.7.0-openjdk 2017-02-13
Scientific Linux SLSA-2017:0269-1 java-1.7.0-openjdk 2017-02-13
Red Hat RHSA-2017:0269-01 java-1.7.0-openjdk 2017-02-13
Ubuntu USN-3194-1 openjdk-7 2017-02-08
Mageia MGASA-2017-0041 java-1.8.0-openjdk 2017-02-05
openSUSE openSUSE-SU-2017:0374-1 java-1_8_0-openjdk 2017-02-03
Ubuntu USN-3181-1 openssl 2017-01-31
SUSE SUSE-SU-2017:0346-1 java-1_8_0-openjdk 2017-01-31
Ubuntu USN-3179-1 openjdk-8 2017-01-25
Gentoo 201701-65 oracle-jre-bin 2017-01-25
Scientific Linux SLSA-2017:0180-1 java-1.8.0-openjdk 2017-01-24
Oracle ELSA-2017-0180 java-1.8.0-openjdk 2017-01-20
Oracle ELSA-2017-0180 java-1.8.0-openjdk 2017-01-20
CentOS CESA-2017:0180 java-1.8.0-openjdk 2017-01-21
CentOS CESA-2017:0180 java-1.8.0-openjdk 2017-01-21
Red Hat RHSA-2017:0180-01 java-1.8.0-openjdk 2017-01-20
Red Hat RHSA-2017:0175-01 java-1.8.0-oracle 2017-01-19
Red Hat RHSA-2017:0176-01 java-1.7.0-oracle 2017-01-19
Red Hat RHSA-2017:0177-01 java-1.6.0-sun 2017-01-19
Slackware SSA:2016-363-01 python 2016-12-28
Gentoo 201612-16 openssl 2016-12-07
Mageia MGASA-2016-0408 virtualbox 2016-12-05

Comments (none posted)

openssl: multiple vulnerabilities

Package(s):openssl CVE #(s):CVE-2016-6305 CVE-2016-6307 CVE-2016-6308
Created:September 23, 2016 Updated:September 28, 2016
Description:

From the OpenSSL advisory:

CVE-2016-6305 - OpenSSL 1.1.0 SSL/TLS will hang during a call to SSL_peek() if the peer sends an empty record. This could be exploited by a malicious peer in a Denial Of Service attack.

CVE-2016-6307 - A TLS message includes 3 bytes for its length in the header for the message. This would allow for messages up to 16Mb in length. Messages of this length are excessive and OpenSSL includes a check to ensure that a peer is sending reasonably sized messages in order to avoid too much memory being consumed to service a connection. A flaw in the logic of version 1.1.0 means that memory for the message is allocated too early, prior to the excessive message length check. Due to way memory is allocated in OpenSSL this could mean an attacker could force up to 21Mb to be allocated to service a connection. This could lead to a Denial of Service through memory exhaustion.

CVE-2016-6308 - A DTLS message includes 3 bytes for its length in the header for the message. This would allow for messages up to 16Mb in length. Messages of this length are excessive and OpenSSL includes a check to ensure that a peer is sending reasonably sized messages in order to avoid too much memory being consumed to service a connection. A flaw in the logic of version 1.1.0 means that memory for the message is allocated too early, prior to the excessive message length check. Due to way memory is allocated in OpenSSL this could mean an attacker could force up to 21Mb to be allocated to service a connection. This could lead to a Denial of Service through memory exhaustion.

Alerts:
Slackware SSA:2016-266-01 openssl 2016-09-22
Gentoo 201612-16 openssl 2016-12-07
Mageia MGASA-2016-0408 virtualbox 2016-12-05

Comments (none posted)

openssl: denial of service

Package(s):openssl CVE #(s):CVE-2016-7052
Created:September 27, 2016 Updated:September 28, 2016
Description: From the CVE entry:

crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.

Alerts:
SUSE SUSE-SU-2016:2470-2 nodejs4 2016-11-01
openSUSE openSUSE-SU-2016:2496-1 nodejs 2016-10-11
Fedora FEDORA-2016-97454404fe openssl 2016-10-11
SUSE SUSE-SU-2016:2470-1 nodejs4 2016-10-06
Fedora FEDORA-2016-a555159613 openssl 2016-09-28
Arch Linux ASA-201609-30 openssl 2016-09-28
Arch Linux ASA-201609-28 lib32-openssl 2016-09-27
Slackware SSA:2016-270-01 openssl 2016-09-26
Gentoo 201612-16 openssl 2016-12-07
Mageia MGASA-2016-0408 virtualbox 2016-12-05

Comments (none posted)

openvas-libraries: multiple vulnerabilities

Package(s):openvas-libraries CVE #(s):
Created:September 23, 2016 Updated:September 28, 2016
Description:

From the OpenVAS release notes:

A number of memory leaks have been fixed.

A bug which caused NASL arrays to be freed improperly causing memory corruption under certain circumstances has been fixed.

Alerts:
Fedora FEDORA-2016-63633 openvas-libraries 2016-09-23
Fedora FEDORA-2016-b9ab1def88 openvas-libraries 2016-09-23

Comments (none posted)

openvas-scanner: denial of service

Package(s):openvas-scanner CVE #(s):
Created:September 23, 2016 Updated:September 28, 2016
Description:

From the OpenVAS release notes:

This release addresses a segmentation fault discovered after the release of OpenVAS Scanner 5.0.6 which could result in hanging or failing scans under certain circumstances.

Alerts:
Fedora FEDORA-2016-63633 openvas-scanner 2016-09-23
Fedora FEDORA-2016-b9ab1def88 openvas-scanner 2016-09-23

Comments (none posted)

pidgin: mysterious vulnerabilities

Package(s):pidgin CVE #(s):CVE-2016-1000030 CVE-2016-2379
Created:September 22, 2016 Updated:September 28, 2016
Description: Pidgin suffers from a hashed-password disclosure vulnerability (said hash being usable to login via a replay attack) and a problem described only as "X.509 certificates Improperly Imported" (CVE-2016-1000030).
Alerts:
Slackware SSA:2016-266-02 pidgin 2016-09-22
Slackware SSA:2016-265-01 pidgin 2016-09-21
Gentoo 201701-38 pidgin 2017-01-17

Comments (none posted)

policycoreutils: sandbox escape

Package(s):policycoreutils CVE #(s):CVE-2016-7545
Created:September 26, 2016 Updated:November 23, 2016
Description: From the Debian LTS advisory:

It was discovered that there was a sandbox escape via the "TIOCSTI" ioctl in policycoreutils, a set of programs required for the basic operation of an SELinux-based system.

Alerts:
Oracle ELSA-2016-2702 policycoreutils 2016-11-14
Oracle ELSA-2016-2702 policycoreutils 2016-11-14
Red Hat RHSA-2016:2702-01 policycoreutils 2016-11-14
Debian-LTS DLA-638-1 policycoreutils 2016-09-25
Scientific Linux SLSA-2016:2702-1 policycoreutils 2016-11-21
CentOS CESA-2016:2702 policycoreutils 2016-11-19

Comments (none posted)

python-django: cross-site request forgery

Package(s):python-django CVE #(s):CVE-2016-7401
Created:September 27, 2016 Updated:October 24, 2016
Description: From the Debian advisory:

Sergey Bobrov discovered that cookie parsing in Django and Google Analytics interacted such a way that an attacker could set arbitrary cookies. This allows other malicious web sites to bypass the Cross-Site Request Forgery (CSRF) protections built into Django.

Alerts:
Arch Linux ASA-201610-12 python2-django 2016-10-21
Arch Linux ASA-201610-13 python-django 2016-10-21
Fedora FEDORA-2016-3795497354 python-django 2016-10-11
Fedora FEDORA-2016-5706eeb875 python-django 2016-10-10
Red Hat RHSA-2016:2038-01 python-django 2016-10-10
Red Hat RHSA-2016:2039-01 python-django 2016-10-10
Red Hat RHSA-2016:2040-01 python-django 2016-10-10
Red Hat RHSA-2016:2041-01 python-django 2016-10-10
Debian-LTS DLA-DLA-649-1 python-django 2016-10-06
Mageia MGASA-2016-0334 python-django 2016-10-04
Ubuntu USN-3089-1 python-django 2016-09-27
Debian DSA-3678-1 python-django 2016-09-26

Comments (none posted)

qemu: multiple vulnerabilities

Package(s):qemu CVE #(s):CVE-2016-6490 CVE-2016-6833 CVE-2016-6834 CVE-2016-6836 CVE-2016-6888 CVE-2016-7156 CVE-2016-7157 CVE-2016-7422
Created:September 26, 2016 Updated:September 28, 2016
Description: From the Gentoo advisory:

Multiple vulnerabilities have been discovered in QEMU. Local users within a guest QEMU environment can execute arbitrary code within the host or a cause a Denial of Service condition of the QEMU guest process.

Alerts:
Ubuntu USN-3125-1 qemu, qemu-kvm 2016-11-09
openSUSE openSUSE-SU-2016:2642-1 qemu 2016-10-26
SUSE SUSE-SU-2016:2589-1 qemu 2016-10-21
Fedora FEDORA-2016-a56fb613a8 qemu 2016-10-18
SUSE SUSE-SU-2016:2533-1 xen 2016-10-13
SUSE SUSE-SU-2016:2507-1 xen 2016-10-12
openSUSE openSUSE-SU-2016:2497-1 xen 2016-10-11
openSUSE openSUSE-SU-2016:2494-1 xen 2016-10-11
SUSE SUSE-SU-2016:2473-1 xen 2016-10-07
Gentoo 201609-01 qemu 2016-09-25
Fedora FEDORA-2017-12394e2cc7 qemu 2017-01-25
Fedora FEDORA-2017-b953d4d3a4 qemu 2017-01-20
openSUSE openSUSE-SU-2016:3237-1 qemu 2016-12-22

Comments (none posted)

shiro: access control bypass

Package(s):shiro CVE #(s):CVE-2016-6802
Created:September 23, 2016 Updated:September 28, 2016
Description:

From the CVE entry:

Apache Shiro before 1.3.2, when using a non-root servlet context path, specifically crafted requests can be used to by pass some security servlet filters, resulting in unauthorized access.

Alerts:
Fedora FEDORA-2016-744 shiro 2016-09-23

Comments (none posted)

wireshark: denial of service

Package(s):wireshark-cli CVE #(s):CVE-2016-7175
Created:September 27, 2016 Updated:September 28, 2016
Description: From the CVE entry:

epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark 2.x before 2.0.6 mishandles MAC address data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

Alerts:
Arch Linux ASA-201609-27 wireshark-cli 2016-09-26

Comments (none posted)

wordpress: multiple vulnerabilities

Package(s):wordpress CVE #(s):CVE-2015-8834 CVE-2016-4029 CVE-2016-6634 CVE-2016-6635
Created:September 23, 2016 Updated:October 3, 2016
Description:

From the Debian-LTS advisory:

CVE-2015-8834 - Cross-site scripting (XSS) vulnerability in wp-includes/wp-db.php in WordPress before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a long comment that is improperly stored because of limitations on the MySQL TEXT data type. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3440

CVE-2016-4029 - WordPress before 4.5 does not consider octal and hexadecimal IP address formats when determining an intranet address, which allows remote attackers to bypass an intended SSRF protection mechanism via a crafted address.

CVE-2016-6634 - Cross-site scripting (XSS) vulnerability in the network settings page in WordPress before 4.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2016-6635 - Cross-site request forgery (CSRF) vulnerability in the wp_ajax_wp_compression_test function in wp-admin/includes/ajax- actions.php in WordPress before 4.5 allows remote attackers to hijack the authentication of administrators for requests that change the script compression option.

Alerts:
Debian DSA-3681-2 wordpress 2016-10-01
Debian DSA-3681-1 wordpress 2016-09-29
Debian-LTS DLA-633-1 wordpress 2016-09-22

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2016, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds