Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1165015 - (CVE-2014-8167) CVE-2014-8167 vdsm and vdsclient: does not validate certficate hostname from another vdsm
CVE-2014-8167 vdsm and vdsclient: does not validate certficate hostname from ...
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140203,repor...
: Security
: 1165022 (view as bug list)
Depends On: 1060717 1164978 1165464 1165476
Blocks: 1164675
  Show dependency treegraph
 
Reported: 2014-11-18 01:39 EST by Wade Mealing
Modified: 2015-07-14 13:51 EDT (History)
17 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was found that the VDSM SSL certificate validation implementation did not check whether the server host name matched the domain name in a subject's Common Name (CN) field in a X.509 certificate. A man-in-the-middle attacker could use this flaw to spoof a VDSM server using a specially crafted X.509 certificate.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-07-14 13:51:00 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Wade Mealing 2014-11-18 01:39:32 EST
Multiple security flaws were found in the vdsm SSL certificate validation code. Details:

VDSM can connect to other VDSM services for remote management of virtual hosts stored on a remote node. During the connection the remote node presents a certificate.  The hostname of the remote host is presented in the certificate but not validated by the client connection to ensure that the host matches the correct name.  The SSL client should compare the hostname presented in the certificate to the host name returned in the server certificates "Common Name" field of the "subjectDN" entry. If this is not the case the connection should fail
Comment 3 Kurt Seifried 2015-02-12 00:35:44 EST
*** Bug 1165022 has been marked as a duplicate of this bug. ***
Comment 4 Kurt Seifried 2015-07-14 13:46:29 EDT
As per discussion with Alon Bar-Lev this may be addressed in RHEV 4.
Comment 5 Kurt Seifried 2015-07-14 13:51:00 EDT
Statement:

This issue affects the versions of vdsm as shipped with Red Hat Enterprise Vitalization 3.x. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Note You need to log in before you can comment on or make changes to this bug.