Bug 1674478 (CVE-2019-3833)

Summary: CVE-2019-3833 openwsman: Infinite loop in process_connection() allows denial of service
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bmcclain, dbecker, dblechte, dfediuck, eedri, jjoyce, jschluet, lhh, lpeer, mburns, mgoldboi, michal.skrivanek, praveenkpaladugu, rhos-maint, sbonazzo, sclewis, security-response-team, sherold, slinaber, srinivas_g_gowda, tvignaud, vcrhonek, yturgema
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-09-29 21:57:25 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1677691, 1687762, 1687865    
Bug Blocks: 1667071    

Description Adam Mariš 2019-02-11 13:02:34 UTC
openwsman is vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests.

Comment 1 Adam Mariš 2019-02-11 13:02:35 UTC
Acknowledgments:

Name: Adam Mariš (Red Hat)

Comment 2 Adam Mariš 2019-02-11 13:02:37 UTC
Statement:

Red Hat OpenStack Platform currently only utilizes the client and python client API bindings, not the server components of openwsman. Additionally, updates for this package are received through the Red Hat Enterprise Linux repository.

Red Hat Enterprise Virtualization uses only the openwsman-python client API bindings, not the server components of openwsman.

This issue affects the versions of openwsman as shipped with Red Hat Enterprise Linux 6 and 7. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Comment 7 Cedric Buissart 2019-03-12 10:32:58 UTC
External References:

http://bugzilla.suse.com/show_bug.cgi?id=1122623

Comment 8 Cedric Buissart 2019-03-12 10:33:40 UTC
Created openwsman tracking bugs for this issue:

Affects: fedora-all [bug 1687762]

Comment 11 Fedora Update System 2019-03-29 02:58:25 UTC
openwsman-2.6.5-9.fc29 has been pushed to the Fedora 29 stable repository. If problems still persist, please make note of it in this bug report.

Comment 12 Fedora Update System 2019-03-29 19:14:50 UTC
openwsman-2.6.8-5.fc30 has been pushed to the Fedora 30 stable repository. If problems still persist, please make note of it in this bug report.

Comment 13 errata-xmlrpc 2020-09-29 19:59:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:3940 https://access.redhat.com/errata/RHSA-2020:3940

Comment 14 Product Security DevOps Team 2020-09-29 21:57:25 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-3833

Comment 15 errata-xmlrpc 2020-11-04 03:02:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4689 https://access.redhat.com/errata/RHSA-2020:4689