Bug 1180185 (CVE-2014-3572) - CVE-2014-3572 openssl: ECDH downgrade bug fix
Summary: CVE-2014-3572 openssl: ECDH downgrade bug fix
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-3572
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1180189 1181015 1181016 1181017 1181018
Blocks: 1180194
TreeView+ depends on / blocked
 
Reported: 2015-01-08 15:18 UTC by Vasyl Kaigorodov
Modified: 2021-10-20 10:48 UTC (History)
21 users (show)

Fixed In Version: OpenSSL 1.0.1k, OpenSSL 1.0.0p, OpenSSL 0.9.8zd
Doc Type: Bug Fix
Doc Text:
It was discovered that OpenSSL would perform an ECDH key exchange with a non-ephemeral key even when the ephemeral ECDH cipher suite was selected. A malicious server could make a TLS/SSL client using OpenSSL use a weaker key exchange method than the one requested by the user.
Clone Of:
Environment:
Last Closed: 2021-10-20 10:48:31 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:0066 0 normal SHIPPED_LIVE Moderate: openssl security update 2015-01-22 02:28:18 UTC

Description Vasyl Kaigorodov 2015-01-08 15:18:01 UTC
New release of OpenSSL [1] fixes the following bug:

Fix bug where an OpenSSL client would accept a handshake using an ephemeral ECDH ciphersuites with the server key exchange message omitted.

Upstream patches:
- master: https://github.com/openssl/openssl/commit/b15f8769644b00ef7283521593360b7b2135cb63
- 0.9.8: https://github.com/openssl/openssl/commit/e42a2abadc90664e2615dc63ba7f79cf163f780a
- 1.0.1: https://github.com/openssl/openssl/commit/ef28c6d6767a6a30df5add36171894c96628fe98

[1]: https://www.openssl.org/news/changelog.html

Comment 1 Vincent Danen 2015-01-08 18:25:28 UTC
Upstream commit that looks to fix the problem:

https://github.com/openssl/openssl/commit/b15f8769644b00ef7283521593360b7b2135cb63


External References:

https://www.openssl.org/news/secadv_20150108.txt

Comment 3 Tomas Mraz 2015-01-13 17:09:46 UTC
I am not sure whether this affects also the ephemeral DH ciphersuites or not. The patch adds the requirement for ServerKeyExchange message for ephemeral DH as well.

Comment 4 Huzaifa S. Sidhpurwala 2015-01-16 04:12:11 UTC
Statement:

This issue does not affect the version of openssl and openssl097a as shipped with Red Hat Enterprise Linux 5. This issue does not affect the version of openssl098e as shipped with Red Hat Enterprise Linux 6 and 7.

Comment 5 errata-xmlrpc 2015-01-21 21:28:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7

Via RHSA-2015:0066 https://rhn.redhat.com/errata/RHSA-2015-0066.html


Note You need to log in before you can comment on or make changes to this bug.