Bug 798100 (CVE-2006-7248, CVE-2006-7250)

Summary: CVE-2006-7250 openssl: mime_hdr_cmp NULL dereference crash
Product: [Other] Security Response Reporter: Kurt Seifried <kseifried>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: tmraz
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: openssl 0.9.8u, openssl 1.0.0h Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2012-02-28 08:16:46 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On:    
Bug Blocks: 802502    
Description Flags
openssl PR: 2711 Tolerate bad MIME headers in parser none

Description Kurt Seifried 2012-02-28 03:10:21 UTC
"openssl smime -verify -in" verifies the signature of the input file and
the "-verify" switch expects a signed or encrypted input file. Previously,
running openssl on an S/MIME file that was not encrypted or signed caused
openssl to segfault. With this update, the input file is now checked for a
signature or encryption. Consequently, openssl now returns an error and
quits when attempting to verify an unencrypted or unsigned S/MIME file.

This was fixed in RHSA-2009:1335:

Comment 2 Kurt Seifried 2012-02-28 23:04:36 UTC
Created attachment 566411 [details]
openssl PR: 2711 Tolerate bad MIME headers in parser

Patch is from RHEL-6 OpenSSL source RPM

Comment 4 Tomas Hoger 2012-02-29 09:34:25 UTC
This problem was previously reported via (private) bug #472440 and addressed as non-security bug fix in Red Hat Enterprise Linux 5 packages in 2009 via RHSA-2009:1335:

This patch was also included in openssl and openssl098e packages in Red Hat Enterprise Linux 6 since the initial release.  It's also included in current Fedora packages.  Patch is names as openssl-*-bad-mime.patch

Later in 2012, it was discovered that the fix was previously not pushed upstream and that was done via:

and applied upstream in:
  http://cvs.openssl.org/chngview?cn=22147 (cvs head)
  and cn 22144, 22145, 22146 for commits to 0.9.8, 1.0.0 and 1.0.1 branches

There was some confusion around CVE assignment due to a use of the CVE in unrelated bug report:

CVE-2006-7248 was previously used for this issue.


This issue was corrected in Red Hat Enterprise Linux 5 via RHSA-2009:1335. It did not affect openssl packages shipped with Red Hat Enterprise Linux 6.