Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
For bugs related to Red Hat Enterprise Linux 3 product line. The current stable release is 3.9. For Red Hat Enterprise Linux 6 and above, please visit Red Hat JIRA https://issues.redhat.com/secure/CreateIssue!default.jspa?pid=12332745 to report new issues.

Bug 145469

Summary: CAN-2005-0198 user validation issue in imap when using CRAM-MD5 authetication
Product: Red Hat Enterprise Linux 3 Reporter: Josh Bressers <bressers>
Component: imapAssignee: John Dennis <jdennis>
Status: CLOSED ERRATA QA Contact: David Lawrence <dkl>
Severity: medium Docs Contact:
Priority: medium    
Version: 3.0CC: mjc, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-02-23 17:17:34 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Josh Bressers 2005-01-18 19:43:55 UTC
This issue was reported to us by CERT.  They've asked we keep quiet until they
release their advisory on 2005-01-27

We have received a report from the University of Washington of a
vulnerability in their UW-IMAP server software.  The vulnerability
affects sites using CRAM-MD5 authentication and can allow a remote
attacker to authenticate to the IMAP server as any valid user.  A copy
of the original vulnerability report is included at the bottom of this
message.

Since this issue has already been addressed in a public release of the
software, we are proposing to publish a vulnerability note about this
issue on 2005-01-27.  We may publish sooner if additional public
discussion occurs before then.


The fix is as such


Change:
     u = (md5try && strcmp (hash,hmac_md5 (chal,cl,p,pl))) ? NIL : user;
To:
     u = (md5try && !strcmp (hash,hmac_md5 (chal,cl,p,pl))) ? user : NIL;

The effect of this change is to change the old behavior:
  if retries allowed AND password bad, then fail; else succeed 
to the correct:
  if retries allowed AND password good, then succeed; else fail

This problem is fixed in the January 4, 2005 release version of imap-2004b, on:
       ftp://ftp.cac.washington.edu/mail/imap-2004b.tar.Z

Comment 1 Josh Bressers 2005-01-18 19:45:30 UTC
Please note that this issue only affects installations that are using the
CRAM-MD5 authentication.

Comment 2 Mark J. Cox 2005-02-01 09:49:08 UTC
Public

Comment 3 Josh Bressers 2005-02-03 19:49:04 UTC
Ping on this issue

Comment 4 John Dennis 2005-02-03 22:36:10 UTC
The RHEL-3 imap version was patched, errata RHSA-2005:128-01, was created,
however note the release date was set a year into the future because I didn't
know the embargo date, this will have to be fixed.

Comment 6 Josh Bressers 2005-02-23 17:17:34 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2005-128.html