Bug 604855 - (CVE-2010-2074) CVE-2010-2074 w3m: doesn't handle NULL in Common Name properly
CVE-2010-2074 w3m: doesn't handle NULL in Common Name properly
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
public=20100614,reported=20100614,sou...
: Security
Depends On: 604861 604862 604863 604864
Blocks:
  Show dependency treegraph
 
Reported: 2010-06-16 16:53 EDT by Vincent Danen
Modified: 2015-10-15 17:12 EDT (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-12-27 10:52:13 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
check for null bytes in CN/subjAltName (1.59 KB, application/octet-stream)
2010-06-16 17:03 EDT, Vincent Danen
no flags Details
patch to force ssl_verify_server on and disable SSLv2 support (920 bytes, patch)
2010-06-16 17:05 EDT, Vincent Danen
no flags Details | Diff

  None (edit)
Description Vincent Danen 2010-06-16 16:53:30 EDT
Common Vulnerabilities and Exposures assigned an identifier CVE-2010-2074 to
the following vulnerability:

Name: CVE-2010-2074
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2074
Assigned: 20100525
Reference: MLIST:[oss-security] 20100614 CVE Request: w3m does not check null bytes CN/subjAltName
Reference: URL: http://www.openwall.com/lists/oss-security/2010/06/14/4
Reference: BID:40837
Reference: URL: http://www.securityfocus.com/bid/40837
Reference: SECUNIA:40134
Reference: URL: http://secunia.com/advisories/40134
Reference: VUPEN:ADV-2010-1467
Reference: URL: http://www.vupen.com/english/advisories/2010/1467

istream.c in w3m 0.5.2 and possibly other versions, when
ssl_verify_server is enabled, does not properly handle a '\0'
character in a domain name in the (1) subject's Common Name or (2)
Subject Alternative Name field of an X.509 certificate, which allows
man-in-the-middle attackers to spoof arbitrary SSL servers via a
crafted certificate issued by a legitimate Certification Authority, a
related issue to CVE-2009-2408.
Comment 1 Vincent Danen 2010-06-16 17:01:37 EDT
As noted by Ludwig Nussel of the SUSE security team, w3m does not, by default, verify certificates, however the /etc/w3m/config configuration as supplied by Red Hat Enterprise Linux 5 and Fedora, do have "ssl_verify_server 1" set, so w3m is doing certificate verification by default.
Comment 2 Vincent Danen 2010-06-16 17:03:07 EDT
Created attachment 424590 [details]
check for null bytes in CN/subjAltName

Patch provided by Ludwig Nussel from the SUSE security team.
Comment 3 Vincent Danen 2010-06-16 17:05:14 EDT
Created attachment 424591 [details]
patch to force ssl_verify_server on and disable SSLv2 support

Patch provided by Ludwig Nussel from the SUSE security team.  We don't necessarily need this to enable SSL verification as we do that already, however this patch also disables the use of SSLv2 which we may want.
Comment 5 Vincent Danen 2010-06-16 17:13:26 EDT
Created w3m tracking bugs for this issue

Affects: fedora-all [bug 604864]
Comment 11 Fedora Update System 2010-06-22 06:46:12 EDT
w3m-0.5.2-18.fc13 has been submitted as an update for Fedora 13.
http://admin.fedoraproject.org/updates/w3m-0.5.2-18.fc13
Comment 12 Fedora Update System 2010-06-24 02:52:45 EDT
w3m-0.5.2-17.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/w3m-0.5.2-17.fc12
Comment 18 Fedora Update System 2010-07-08 14:28:04 EDT
w3m-0.5.2-18.fc13 has been pushed to the Fedora 13 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 19 Fedora Update System 2010-07-20 18:46:23 EDT
w3m-0.5.2-17.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 28 errata-xmlrpc 2010-07-27 08:58:45 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2010:0565 https://rhn.redhat.com/errata/RHSA-2010-0565.html
Comment 29 Parag Nemade 2012-12-27 10:52:13 EST
Closing this as this is fixed in all needed product versions

Note You need to log in before you can comment on or make changes to this bug.