Bug 531011 (CVE-2009-3766) - CVE-2009-3766 mutt: missing host name vs. SSL certificate name checks
Summary: CVE-2009-3766 mutt: missing host name vs. SSL certificate name checks
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2009-3766
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://web.nvd.nist.gov/view/vuln/det...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-10-26 14:19 UTC by Tomas Hoger
Modified: 2021-02-25 02:07 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-03-02 19:18:40 UTC
Embargoed:


Attachments (Terms of Use)

Description Tomas Hoger 2009-10-26 14:19:07 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-3766 to the following vulnerability:

mutt_ssl.c in mutt 1.5.16, when OpenSSL is used, does not verify the domain
name in the subject's Common Name (CN) field of an X.509 certificate, which
allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid
certificate.

Upstream bug:
http://dev.mutt.org/trac/ticket/3087

References:
http://marc.info/?l=oss-security&m=125198917018936&w=2

Comment 1 Tomas Hoger 2009-10-26 14:29:46 UTC
CVE description is bit imprecise, as this problem affects mutt versions before 1.5.19, most likely all with POP/IMAP + SSL support using OpenSSL crypto library.

For this flaw to be exploited, following conditions must be met:
- user needs to have a file with trusted certificates, path to it has to be set in .muttrc via certificate_file option; the file should contain at least one CA certificate (i.e. not only server certificates)
- attacker needs to have a valid SSL certificate issues by CA listed in victim's certificate_file
- attacker must be able to re-direct victims network traffic to his malicious server

If all the conditions are met and victim is redirected to an attacker's server, mutt will not warn user about Common Name listed in server's SSL certificate not matching requested host name, allowing user to provide authentication credentials to attacker.

Note: there's no certificate_file configured by default.  In that case, mutt displays info from server's certificate subject, allowing user to decide whether to proceed with the connection.  That info screen will display Common Name not matching user's request.

Comment 3 Tomas Hoger 2009-10-26 14:36:46 UTC
This problem affects mutt versions in Red Hat Enterprise Linux 3, 4 and 5.  Future updates may introduce SSL hostname checks.

Current Fedora versions are not affected.

Comment 5 Josh Bressers 2011-07-25 19:24:49 UTC
Statement:

(none)


Note You need to log in before you can comment on or make changes to this bug.