Bug 524228 (CVE-2009-3291) - CVE-2009-3291 php: openssl extension: Incorrect verification of SSL certificate with NUL in name
Summary: CVE-2009-3291 php: openssl extension: Incorrect verification of SSL certifica...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2009-3291
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://www.php.net/ChangeLog-5.php
Whiteboard:
Depends On: 541594 541595 541596 541597 541598
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-09-18 13:14 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:32 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-01-14 09:24:56 UTC
Embargoed:


Attachments (Terms of Use)
Local copy of upstream PHP-5.2.11 php_openssl_apply_verification_policy patch (1.71 KB, patch)
2009-09-18 13:17 UTC, Jan Lieskovsky
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0040 0 normal SHIPPED_LIVE Moderate: php security update 2010-01-13 18:09:32 UTC

Description Jan Lieskovsky 2009-09-18 13:14:41 UTC
A method to bypass SSL certificate name vs. host name verification via NUL
('\0') character embedded in X509 certificate's CommonName or subjectAltName
was presented at Black Hat USA 2009:

http://www.blackhat.com/html/bh-usa-09/bh-usa-09-archives.html#Marlinspike

This issue was originally reported for Firefox / NSS, but it affects PHP's
php_openssl_apply_verification_policy() too.

References:
-----------
http://www.php.net/ChangeLog-5.php

Upstream patch:
---------------
http://svn.php.net/viewvc?view=revision&revision=288329

Comment 1 Jan Lieskovsky 2009-09-18 13:17:35 UTC
Created attachment 361656 [details]
Local copy of upstream PHP-5.2.11 php_openssl_apply_verification_policy patch

Comment 2 Jan Lieskovsky 2009-09-18 13:18:11 UTC
This issue affects the versions of php package, as shipped with Red Hat
Enterprise Linux 3, 4, and 5.

Comment 3 Jan Lieskovsky 2009-09-22 08:54:11 UTC
MITRE's CVE-2009-3291 record:
-----------------------------

The php_openssl_apply_verification_policy function in PHP before
5.2.11 does not properly perform certificate validation, which has
unknown impact and attack vectors, probably related to an ability to
spoof certificates.

References:
-----------
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3291
http://www.php.net/ChangeLog-5.php#5.2.11
http://www.php.net/releases/5_2_11.php
http://www.osvdb.org/58185
http://secunia.com/advisories/36791
http://xforce.iss.net/xforce/xfdb/53334

Comment 4 Tomas Hoger 2009-09-25 07:53:34 UTC
I've been digging more into this yesterday to see what may really be impacted by this flaw.

First, as all CVE-2009-2408-like issues, this affects SSL clients connecting to remote SSL servers.  There are 2 major requirements on attacker:

- attacker needs a specially crafted certificate with \0 in CN, signed by a CA trusted by victim; in most cases a per-target-site certificate is required, only in very few cases "universal MITM certificate" (see Moxie's presentation for details) was usable so far

- attacker must be able to redirect victim to his malicious site while user is trying to access some valid site (MITM, DNS spoofing)

Now to the PHP specifics:

Affected code is reached when using PHP streams:
  http://www.php.net/manual/en/book.stream.php

In PHP5, this may affect PHP applications implementing SSL client using e.g. stream_socket_client():
  http://www.php.net/manual/en/function.stream-socket-client.php

But the streams are also used by functions like fopen() or file_get_contents(), so the code may be reached when accessing https:// URLs.

However, when using SSL context for PHP streams, the default is to not perform any certificate verification at all (i.e. it is not checked whether the server certificate is signed by some trusted CA and certificate host name is not checked against the connection host name).  To enable SSL checking, context has to be created first with non-default options and passed to the functions:
  http://www.php.net/manual/en/function.stream-context-create.php

For SSL context, following options must be set: verify_peer, cafile / capath and CN_match, where CN_match holds the name to be used when checking against certificate CN:
  http://www.php.net/manual/en/context.ssl.php

(Note: it's not sufficient to only set verify_peer, host name is not automatically extracted from the URLs passed to functions as fopen() and has to be specified explicitly.)

Doing a Google CodeSearch for "CN_match lang:php", CN_match is only set explicitly in very few project (~5 unique projects, one of them, HTTP_Request2 pear module, used by few more).  In general, it seems this is very rarely used.  Given the attack complexity (universal MITM certificate can not be used against PHP), I'd say this is impact=low issue.

Things are little different for PHP4.  stream_socket_client() is not available, fopen() and file_get_contents() do not accept context as an argument.  Though context is accepted as 6th argument of fsockopen():
  http://www.php.net/manual/en/function.fsockopen.php

Note: In PHP5, you can not pass context to fsockopen() any more, only 5 arguments are accepted.

As with PHP5, there's no certificate verification by default.

Comment 6 Tim Jackson 2009-11-21 13:30:55 UTC
http://admin.fedoraproject.org/updates/F11/FEDORA-2009-11753 jumped ahead of http://admin.fedoraproject.org/updates/F11/FEDORA-2009-11852 and this got fixed in that for PHP 5.2 on F-11

Comment 8 errata-xmlrpc 2010-01-13 18:10:25 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 3

Via RHSA-2010:0040 https://rhn.redhat.com/errata/RHSA-2010-0040.html

Comment 10 Tomas Hoger 2013-09-25 14:05:10 UTC
Related issue is CVE-2013-4248 / bug 997097, which corrects handling of subjectAltNames.


Note You need to log in before you can comment on or make changes to this bug.