Bug 145469 - CAN-2005-0198 user validation issue in imap when using CRAM-MD5 authetication
Summary: CAN-2005-0198 user validation issue in imap when using CRAM-MD5 authetication
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: imap
Version: 3.0
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: John Dennis
QA Contact: David Lawrence
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2005-01-18 19:43 UTC by Josh Bressers
Modified: 2007-11-30 22:07 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2005-02-23 17:17:34 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2005:128 0 moderate SHIPPED_LIVE Moderate: imap security update 2005-02-23 05:00:00 UTC

Description Josh Bressers 2005-01-18 19:43:55 UTC
This issue was reported to us by CERT.  They've asked we keep quiet until they
release their advisory on 2005-01-27

We have received a report from the University of Washington of a
vulnerability in their UW-IMAP server software.  The vulnerability
affects sites using CRAM-MD5 authentication and can allow a remote
attacker to authenticate to the IMAP server as any valid user.  A copy
of the original vulnerability report is included at the bottom of this
message.

Since this issue has already been addressed in a public release of the
software, we are proposing to publish a vulnerability note about this
issue on 2005-01-27.  We may publish sooner if additional public
discussion occurs before then.


The fix is as such


Change:
     u = (md5try && strcmp (hash,hmac_md5 (chal,cl,p,pl))) ? NIL : user;
To:
     u = (md5try && !strcmp (hash,hmac_md5 (chal,cl,p,pl))) ? user : NIL;

The effect of this change is to change the old behavior:
  if retries allowed AND password bad, then fail; else succeed 
to the correct:
  if retries allowed AND password good, then succeed; else fail

This problem is fixed in the January 4, 2005 release version of imap-2004b, on:
       ftp://ftp.cac.washington.edu/mail/imap-2004b.tar.Z

Comment 1 Josh Bressers 2005-01-18 19:45:30 UTC
Please note that this issue only affects installations that are using the
CRAM-MD5 authentication.

Comment 2 Mark J. Cox 2005-02-01 09:49:08 UTC
Public

Comment 3 Josh Bressers 2005-02-03 19:49:04 UTC
Ping on this issue

Comment 4 John Dennis 2005-02-03 22:36:10 UTC
The RHEL-3 imap version was patched, errata RHSA-2005:128-01, was created,
however note the release date was set a year into the future because I didn't
know the embargo date, this will have to be fixed.

Comment 6 Josh Bressers 2005-02-23 17:17:34 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2005-128.html



Note You need to log in before you can comment on or make changes to this bug.