Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 531011 - (CVE-2009-3766) CVE-2009-3766 mutt: missing host name vs. SSL certificate name checks
CVE-2009-3766 mutt: missing host name vs. SSL certificate name checks
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
http://web.nvd.nist.gov/view/vuln/det...
public=20090810,reported=20090821,sou...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2009-10-26 10:19 EDT by Tomas Hoger
Modified: 2015-03-03 02:48 EST (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-03-02 14:18:40 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Tomas Hoger 2009-10-26 10:19:07 EDT
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-3766 to the following vulnerability:

mutt_ssl.c in mutt 1.5.16, when OpenSSL is used, does not verify the domain
name in the subject's Common Name (CN) field of an X.509 certificate, which
allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid
certificate.

Upstream bug:
http://dev.mutt.org/trac/ticket/3087

References:
http://marc.info/?l=oss-security&m=125198917018936&w=2
Comment 1 Tomas Hoger 2009-10-26 10:29:46 EDT
CVE description is bit imprecise, as this problem affects mutt versions before 1.5.19, most likely all with POP/IMAP + SSL support using OpenSSL crypto library.

For this flaw to be exploited, following conditions must be met:
- user needs to have a file with trusted certificates, path to it has to be set in .muttrc via certificate_file option; the file should contain at least one CA certificate (i.e. not only server certificates)
- attacker needs to have a valid SSL certificate issues by CA listed in victim's certificate_file
- attacker must be able to re-direct victims network traffic to his malicious server

If all the conditions are met and victim is redirected to an attacker's server, mutt will not warn user about Common Name listed in server's SSL certificate not matching requested host name, allowing user to provide authentication credentials to attacker.

Note: there's no certificate_file configured by default.  In that case, mutt displays info from server's certificate subject, allowing user to decide whether to proceed with the connection.  That info screen will display Common Name not matching user's request.
Comment 3 Tomas Hoger 2009-10-26 10:36:46 EDT
This problem affects mutt versions in Red Hat Enterprise Linux 3, 4 and 5.  Future updates may introduce SSL hostname checks.

Current Fedora versions are not affected.
Comment 5 Josh Bressers 2011-07-25 15:24:49 EDT
Statement:

(none)

Note You need to log in before you can comment on or make changes to this bug.