Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1093273 - (CVE-2014-0363) CVE-2014-0363 smack: incorrect X.509 certificate validation
CVE-2014-0363 smack: incorrect X.509 certificate validation
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20130206,repor...
: Security
Depends On: 1093274 1093461 1093462 1093469
Blocks: 1093275 1114455 1232965
  Show dependency treegraph
 
Reported: 2014-05-01 02:30 EDT by Murray McAllister
Modified: 2018-05-10 14:11 EDT (History)
16 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was found that the ServerTrustManager in the Smack XMPP API did not verify basicConstraints and nameConstraints in X.509 certificate chains. A man-in-the-middle attacker could use this flaw to spoof servers and obtain sensitive information.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0818 normal SHIPPED_LIVE Important: Red Hat JBoss BRMS 6.0.2 update 2014-06-30 20:51:53 EDT
Red Hat Product Errata RHSA-2014:0819 normal SHIPPED_LIVE Important: Red Hat JBoss BPM Suite 6.0.2 update 2014-06-30 20:51:46 EDT
Red Hat Product Errata RHSA-2015:1176 normal SHIPPED_LIVE Important: Red Hat JBoss Fuse 6.2.0 update 2015-06-23 16:52:52 EDT

  None (edit)
Description Murray McAllister 2014-05-01 02:30:00 EDT
Common Vulnerabilities and Exposures assigned an identifier CVE-2014-0363 to
the following vulnerability:

Name: CVE-2014-0363
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0363
Assigned: 20131205
Reference: http://community.igniterealtime.org/blogs/ignite/2014/04/17/asmack-400-rc1-has-been-released
Reference: http://issues.igniterealtime.org/browse/SMACK-410
Reference: CERT-VN:VU#489228
Reference: http://www.kb.cert.org/vuls/id/489228

The ServerTrustManager component in the Ignite Realtime Smack XMPP API
before 4.0.0-rc1 does not verify basicConstraints and nameConstraints
in X.509 certificate chains from SSL servers, which allows
man-in-the-middle attackers to spoof servers and obtain sensitive
information via a crafted certificate chain.

The man-in-the-middle attacker requires a certificate that is valid for any domain name.

Upstream patch:  http://fisheye.igniterealtime.org/changelog/smackgit?cs=93030c218c62cf0a0a8ea48746db1452fa34033c

From code inspection, this issue affects the 3.2.2 version in Fedora (the CERT advisory mentions version 3.4.1 and possibly earlier versions).
Comment 1 Murray McAllister 2014-05-01 02:31:44 EDT
Created smack tracking bugs for this issue:

Affects: fedora-all [bug 1093274]
Comment 6 errata-xmlrpc 2014-06-30 16:52:12 EDT
This issue has been addressed in following products:

  JBoss BPM Suite 6.0.2

Via RHSA-2014:0819 https://rhn.redhat.com/errata/RHSA-2014-0819.html
Comment 7 errata-xmlrpc 2014-06-30 16:52:50 EDT
This issue has been addressed in following products:

  JBoss BRMS 6.0.2

Via RHSA-2014:0818 https://rhn.redhat.com/errata/RHSA-2014-0818.html
Comment 8 Fedora Update System 2014-12-13 04:35:12 EST
smack-3.2.2-8.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 9 Fedora Update System 2014-12-14 23:30:12 EST
smack-3.2.2-6.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 12 errata-xmlrpc 2015-06-23 12:52:59 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Fuse 6.2.0

Via RHSA-2015:1176 https://rhn.redhat.com/errata/RHSA-2015-1176.html

Note You need to log in before you can comment on or make changes to this bug.