Bug 1022913 (CVE-2013-4466) - CVE-2013-4466 gnutls: dane_query_tlsa() buffer overflow (GNUTLS-SA-2013-3)
Summary: CVE-2013-4466 gnutls: dane_query_tlsa() buffer overflow (GNUTLS-SA-2013-3)
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2013-4466
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1022925 1022926
Blocks: 1022917
TreeView+ depends on / blocked
 
Reported: 2013-10-24 09:19 UTC by Tomas Hoger
Modified: 2021-02-17 07:14 UTC (History)
10 users (show)

Fixed In Version: gnutls 3.1.15, gnutls 3.2.5
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-10-29 15:55:45 UTC
Embargoed:


Attachments (Terms of Use)

Description Tomas Hoger 2013-10-24 09:19:24 UTC
Upstream GnuTLS versions 3.1.15 and 3.2.5 correct a buffer overflow in dane_query_tlsa() function used to parse DANE (DNS-based Authentication of Named Entities) DNS records.  The function parses DNS server reply into dane_query_st / dane_query_t struct which can hold up to 4 entries, but the function failed to check this and allowed parsing more then 4 entries form the reply, resulting in buffer overflow.

An application using DANE protocol to verify certificates could crash or, possibly, execute arbitrary code when parsing a response from a malicious DNS server.

Announcements of 3.1.15 and 3.2.5 versions:
http://lists.gnutls.org/pipermail/gnutls-devel/2013-October/006511.html
http://lists.gnutls.org/pipermail/gnutls-devel/2013-October/006512.html

Upstream commits (master and 3.1 branch):
https://gitorious.org/gnutls/gnutls/commit/ed51e5e53cfbab3103d6b7b85b7ba4515e4f30c3
https://gitorious.org/gnutls/gnutls/commit/916deedf41604270ac398314809e8377476433db

DANE support was introduced upstream in version 3.1.3.

Comment 1 Tomas Hoger 2013-10-24 09:24:36 UTC
mingw-gnutls packages in Fedora (19+) currently use GnuTLS version with DANE support, but it's not compiled in because of missing unbound.  Excerpt from build.log:

checking whether to build libdane... yes
checking for unbound library... no
configure: WARNING:
***
*** libunbound was not found. Libdane will not be built.
***

Hence those packages are not affected.

Comment 3 Tomas Hoger 2013-10-24 09:35:59 UTC
Created gnutls tracking bugs for this issue:

Affects: fedora-all [bug 1022926]

Comment 4 Tomas Hoger 2013-10-25 06:49:58 UTC
Upstream advisory id is GNUTLS-SA-2013-3:
http://www.gnutls.org/security.html#GNUTLS-SA-2013-3

Comment 5 Fedora Update System 2013-10-29 03:34:34 UTC
gnutls-3.1.15-1.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 6 Tomas Hoger 2013-10-29 15:55:21 UTC
Statement:

Not vulnerable. This issue did not affect the versions of gnutls as shipped with Red Hat Enterprise Linux 5 and 6 as they did not include support for DANE protocol.

Comment 8 Tomas Hoger 2013-11-05 21:11:33 UTC
(In reply to Tomas Hoger from comment #7)
> New GnuTLS versions 3.1.16 and 3.2.6 correct off-by-one bug in the original
> fix

This problem got new CVE CVE-2013-4487, tracked via bug 1025637.

Comment 9 Fedora Update System 2013-11-10 08:10:15 UTC
gnutls-3.1.16-1.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 10 Fedora Update System 2013-11-18 02:56:29 UTC
gnutls-3.1.16-1.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.