Bug 1127491 (CVE-2014-5139)

Summary: CVE-2014-5139 openssl: crash with SRP ciphersuite in Server Hello message
Product: [Other] Security Response Reporter: Andrew Griffiths <agriffit>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aavati, abaron, acathrow, alonbl, aneelica, aortega, apevec, ayoung, bazulay, bmcclain, bressers, cdewolf, cfergeau, chrisw, dallan, dandread, darran.lofthouse, dblechte, dgregor, djorm, dknox, ecohen, erik-fedora, fdeutsch, fnasser, gklein, gkotton, huwang, huzaifas, idith, iheim, jason.greene, jawilson, jclere, jdoyle, jgreguske, jrusnack, ktietz, lfarkas, lgao, lhh, lpeer, markmc, myarboro, nlevinki, pgier, pslavice, pstehlik, rbryant, rfortier, rhs-bugs, rh-spice-bugs, rjones, rsvoboda, sclewis, smohan, ssaha, tmraz, vbellur, vtunka, weli, ycui, yeylon
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: openssl 1.0.1i Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-08-07 06:45:02 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1118171, 1127468, 1127506    

Description Andrew Griffiths 2014-08-07 01:17:28 UTC
A null pointer deference flaw was found in OpenSSL's Secure Remote Password (SRP) implementation. An attacker controlling a malicious server could use this flaw to crash a vulnerable client.

Comment 2 Arun Babu Neelicattu 2014-08-07 05:53:29 UTC
External References:

https://www.openssl.org/news/secadv_20140806.txt

Comment 4 Tomas Hoger 2014-08-07 06:35:44 UTC
The openssl packages shipped in Red Hat Enterprise Linux and Fedora are build with the Secure Remote Password (SRP) support disabled and were therefore not affected by this issue.

Also note that SRP support was introduced upstream in version 1.0.1.

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=edc032b
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0deea0e

Comment 5 David Jorm 2014-08-07 06:48:13 UTC
Statement:

Not vulnerable. This issue did not affect the versions of openssl as shipped
with Red Hat Enterprise Linux 5, 6 and 7, Red Hat Enterprise Virtualization 3,
and Red Hat Enterprise Storage 2, as they do not enable Secure Remote Password
(SRP) support. All other supported Red Hat products that include openssl use
older versions that are not affected by this issue.

Comment 6 Tomas Hoger 2014-08-07 07:43:43 UTC
*** Bug 1118169 has been marked as a duplicate of this bug. ***

Comment 7 Tomas Hoger 2014-08-07 07:44:53 UTC
Upstream commit:
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=80bd7b41b30af6ee96f519e629463583318de3b0

Note that CVE-2014-2970 mentioned in the commit message is a duplicate of this CVE-2014-5139.