Bug 736087 (CVE-2011-3207) - CVE-2011-3207 openssl: CRL verification vulnerability
Summary: CVE-2011-3207 openssl: CRL verification vulnerability
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-3207
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20110906,repor...
Depends On: 736088 736089 737520 745562 846213
Blocks: 736091
TreeView+ depends on / blocked
 
Reported: 2011-09-06 16:14 UTC by Vincent Danen
Modified: 2019-06-08 18:54 UTC (History)
8 users (show)

Fixed In Version: openssl 1.0.0e
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-11-23 07:54:59 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:1409 normal SHIPPED_LIVE Moderate: openssl security update 2011-10-26 16:58:49 UTC

Description Vincent Danen 2011-09-06 16:14:33 UTC
From the upstream advisory [1]:

Under certain circumstances OpenSSL's internal certificate verification
routines can incorrectly accept a CRL whose nextUpdate field is in the past.
(CVE-2011-3207)

This issue applies to OpenSSL versions 1.0.0 through 1.0.0d. Versions of
OpenSSL before 1.0.0 are not affected.

Users of affected versions of OpenSSL should update to the OpenSSL 1.0.0e
release, which contains a patch to correct this issue.

Thanks to Kaspar Brand <ossl@velox.ch> for identifying this bug and 
suggesting a fix.

Applications are only affected by the CRL checking vulnerability if they enable
OpenSSL's internal CRL checking which is off by default. For example by setting
the verification flag X509_V_FLAG_CRL_CHECK or X509_V_FLAG_CRL_CHECK_ALL.
Applications which use their own custom CRL checking (such as Apache) are not
affected.


[1] http://www.openssl.org/news/secadv_20110906.txt

Comment 1 Vincent Danen 2011-09-06 16:17:10 UTC
Created mingw32-openssl tracking bugs for this issue

Affects: fedora-all [bug 736089]

Comment 2 Vincent Danen 2011-09-06 16:17:14 UTC
Created openssl tracking bugs for this issue

Affects: fedora-all [bug 736088]

Comment 3 Tomas Hoger 2011-09-09 10:59:28 UTC
Upstream fix:
  http://cvs.openssl.org/chngview?cn=21349

Comment 7 Jan Lieskovsky 2011-10-06 11:56:17 UTC
This issue did not affect the versions of the openssl package, as shipped with
Red Hat Enterprise Linux 4 and 5.

This issue did not affect the version of the openssl096b package, as shipped
with Red Hat Enterprise Linux 4.

This issue did not affect the version of the openssl097a package, as shipped
with Red Hat Enterprise Linux 5.

This issue did not affect the version of the openssl098e package, as shipped
with Red Hat Enterprise Linux 6.

Comment 10 Vincent Danen 2011-10-26 14:41:15 UTC
Statement:

This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 4 and 5, openssl096b as shipped with Red Hat Enterprise Linux 4, openssl097a as shipped with Red Hat Enterprise Linux 5, or openssl098e as shipped with Red Hat Enterprise Linux 6.


External References:

http://www.openssl.org/news/secadv_20110906.txt

Comment 11 errata-xmlrpc 2011-10-26 16:58:56 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:1409 https://rhn.redhat.com/errata/RHSA-2011-1409.html


Note You need to log in before you can comment on or make changes to this bug.