Bug 604855 (CVE-2010-2074)

Summary: CVE-2010-2074 w3m: doesn't handle NULL in Common Name properly
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dkutalek, eng-i18n-bugs, i18n-bugs, jlieskov, mjc, pnemade
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2012-12-27 15:52:13 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 604861, 604862, 604863, 604864    
Bug Blocks:    
Attachments:
Description Flags
check for null bytes in CN/subjAltName
none
patch to force ssl_verify_server on and disable SSLv2 support none

Description Vincent Danen 2010-06-16 20:53:30 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2010-2074 to
the following vulnerability:

Name: CVE-2010-2074
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2074
Assigned: 20100525
Reference: MLIST:[oss-security] 20100614 CVE Request: w3m does not check null bytes CN/subjAltName
Reference: URL: http://www.openwall.com/lists/oss-security/2010/06/14/4
Reference: BID:40837
Reference: URL: http://www.securityfocus.com/bid/40837
Reference: SECUNIA:40134
Reference: URL: http://secunia.com/advisories/40134
Reference: VUPEN:ADV-2010-1467
Reference: URL: http://www.vupen.com/english/advisories/2010/1467

istream.c in w3m 0.5.2 and possibly other versions, when
ssl_verify_server is enabled, does not properly handle a '\0'
character in a domain name in the (1) subject's Common Name or (2)
Subject Alternative Name field of an X.509 certificate, which allows
man-in-the-middle attackers to spoof arbitrary SSL servers via a
crafted certificate issued by a legitimate Certification Authority, a
related issue to CVE-2009-2408.

Comment 1 Vincent Danen 2010-06-16 21:01:37 UTC
As noted by Ludwig Nussel of the SUSE security team, w3m does not, by default, verify certificates, however the /etc/w3m/config configuration as supplied by Red Hat Enterprise Linux 5 and Fedora, do have "ssl_verify_server 1" set, so w3m is doing certificate verification by default.

Comment 2 Vincent Danen 2010-06-16 21:03:07 UTC
Created attachment 424590 [details]
check for null bytes in CN/subjAltName

Patch provided by Ludwig Nussel from the SUSE security team.

Comment 3 Vincent Danen 2010-06-16 21:05:14 UTC
Created attachment 424591 [details]
patch to force ssl_verify_server on and disable SSLv2 support

Patch provided by Ludwig Nussel from the SUSE security team.  We don't necessarily need this to enable SSL verification as we do that already, however this patch also disables the use of SSLv2 which we may want.

Comment 5 Vincent Danen 2010-06-16 21:13:26 UTC
Created w3m tracking bugs for this issue

Affects: fedora-all [bug 604864]

Comment 11 Fedora Update System 2010-06-22 10:46:12 UTC
w3m-0.5.2-18.fc13 has been submitted as an update for Fedora 13.
http://admin.fedoraproject.org/updates/w3m-0.5.2-18.fc13

Comment 12 Fedora Update System 2010-06-24 06:52:45 UTC
w3m-0.5.2-17.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/w3m-0.5.2-17.fc12

Comment 18 Fedora Update System 2010-07-08 18:28:04 UTC
w3m-0.5.2-18.fc13 has been pushed to the Fedora 13 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 19 Fedora Update System 2010-07-20 22:46:23 UTC
w3m-0.5.2-17.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 28 errata-xmlrpc 2010-07-27 12:58:45 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2010:0565 https://rhn.redhat.com/errata/RHSA-2010-0565.html

Comment 29 Parag Nemade 2012-12-27 15:52:13 UTC
Closing this as this is fixed in all needed product versions