Bug 531011 (CVE-2009-3766)
Summary: | CVE-2009-3766 mutt: missing host name vs. SSL certificate name checks | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | jrusnack, mlichvar, pertusus, rvokal |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3766 | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-03-02 19:18:40 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Tomas Hoger
2009-10-26 14:19:07 UTC
CVE description is bit imprecise, as this problem affects mutt versions before 1.5.19, most likely all with POP/IMAP + SSL support using OpenSSL crypto library. For this flaw to be exploited, following conditions must be met: - user needs to have a file with trusted certificates, path to it has to be set in .muttrc via certificate_file option; the file should contain at least one CA certificate (i.e. not only server certificates) - attacker needs to have a valid SSL certificate issues by CA listed in victim's certificate_file - attacker must be able to re-direct victims network traffic to his malicious server If all the conditions are met and victim is redirected to an attacker's server, mutt will not warn user about Common Name listed in server's SSL certificate not matching requested host name, allowing user to provide authentication credentials to attacker. Note: there's no certificate_file configured by default. In that case, mutt displays info from server's certificate subject, allowing user to decide whether to proceed with the connection. That info screen will display Common Name not matching user's request. This problem affects mutt versions in Red Hat Enterprise Linux 3, 4 and 5. Future updates may introduce SSL hostname checks. Current Fedora versions are not affected. Statement: (none) |