Bug 798100 (CVE-2006-7248, CVE-2006-7250) - CVE-2006-7250 openssl: mime_hdr_cmp NULL dereference crash
Summary: CVE-2006-7250 openssl: mime_hdr_cmp NULL dereference crash
Status: CLOSED ERRATA
Alias: CVE-2006-7248, CVE-2006-7250
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20060829,repor...
Keywords: Reopened, Security
Depends On:
Blocks: 802502
TreeView+ depends on / blocked
 
Reported: 2012-02-28 03:10 UTC by Kurt Seifried
Modified: 2016-03-04 11:16 UTC (History)
1 user (show)

(edit)
Clone Of:
(edit)
Last Closed: 2012-02-28 08:16:46 UTC


Attachments (Terms of Use)
openssl PR: 2711 Tolerate bad MIME headers in parser (596 bytes, patch)
2012-02-28 23:04 UTC, Kurt Seifried
no flags Details | Diff

Description Kurt Seifried 2012-02-28 03:10:21 UTC
"openssl smime -verify -in" verifies the signature of the input file and
the "-verify" switch expects a signed or encrypted input file. Previously,
running openssl on an S/MIME file that was not encrypted or signed caused
openssl to segfault. With this update, the input file is now checked for a
signature or encryption. Consequently, openssl now returns an error and
quits when attempting to verify an unencrypted or unsigned S/MIME file.

This was fixed in RHSA-2009:1335:
  http://rhn.redhat.com/errata/RHSA-2009-1335.html

Comment 2 Kurt Seifried 2012-02-28 23:04:36 UTC
Created attachment 566411 [details]
openssl PR: 2711 Tolerate bad MIME headers in parser

Patch is from RHEL-6 OpenSSL source RPM

Comment 4 Tomas Hoger 2012-02-29 09:34:25 UTC
This problem was previously reported via (private) bug #472440 and addressed as non-security bug fix in Red Hat Enterprise Linux 5 packages in 2009 via RHSA-2009:1335:
  http://rhn.redhat.com/errata/RHSA-2009-1335.html

This patch was also included in openssl and openssl098e packages in Red Hat Enterprise Linux 6 since the initial release.  It's also included in current Fedora packages.  Patch is names as openssl-*-bad-mime.patch

Later in 2012, it was discovered that the fix was previously not pushed upstream and that was done via:
  http://marc.info/?l=openssl-dev&m=132886769402643&w=2
  http://rt.openssl.org/Ticket/Display.html?id=2711&user=guest&pass=guest

and applied upstream in:
  http://cvs.openssl.org/chngview?cn=22147 (cvs head)
  and cn 22144, 22145, 22146 for commits to 0.9.8, 1.0.0 and 1.0.1 branches

There was some confusion around CVE assignment due to a use of the CVE in unrelated bug report:
  http://thread.gmane.org/gmane.comp.security.oss.general/7012
  http://thread.gmane.org/gmane.comp.security.oss.general/7005/focus=7035

CVE-2006-7248 was previously used for this issue.

Statement:

This issue was corrected in Red Hat Enterprise Linux 5 via RHSA-2009:1335. It did not affect openssl packages shipped with Red Hat Enterprise Linux 6.


Note You need to log in before you can comment on or make changes to this bug.