Bug 1037590 - VUL-0: mysql: AGAIN.RIDDLE: disabled SSL support reports success on SSL
VUL-0: mysql: AGAIN.RIDDLE: disabled SSL support reports success on SSL
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Kristyna Streitova
Security Team bot
Depends on:
  Show dependency treegraph
Reported: 2017-05-04 12:17 UTC by Marcus Meissner
Modified: 2017-07-19 22:39 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2017-05-04 12:17:20 UTC
via oss-sec

From: Pali Rohár <pali.rohar@gmail.com>
Subject: [oss-security] MySQL - Again Riddle vulnerability (public disclosure)
Date: Wed, 3 May 2017 18:23:09 +0200


The Riddle vulnerability (CVE-2017-3305) we have it there again. 

So what happened?

In 2015 was discovered BACKRONYM vulnerability (CVE-2015-3152) which 
allowed an attacker to downgrade and snoop on the SSL encrypted 
connection between MySQL client and server. Oracle claimed it was fixed 
in MySQL 5.5.49. Later in February 2017 I discovered The Riddle 
vulnerability (CVE-2017-3305) which allowed an attacker to do man in the 
middle attack. Oracle claimed it was fixed in MySQL 5.5.55.

And now in April 2017 I found out that it is still not fixed in MySQL 
5.5.55 properly and I named this defect Again Riddle. Basically fix for 
The Riddle in 5.5.55 introduced Again Riddle.

And what is the problem?

If MySQL client library libmysqlclient.so is compiled from source code 
without SSL support via cmake switch -DWITH_SSL=OFF, then all SSL 
related functions from libmysqlclient.so return success (non-error) 
value. And function mysql_real_connect() from libmysqlclient.so connects 
to MySQL server via plain text protocol, even if client enforced SSL 
mode with certificate verification. Which means that function for 
enforcing SSL mode does nothing if libmysqlclient.so is compiled without 
SSL support. So attacker can do exactly same what for The Riddle 

So every application which links to libmysqlclient.so and require SSL 
encryption of MySQL protocol is affected.

I contacted Oracle, MariaDB and Percona security teams about this 
problem and after discussion we scheduled public disclosure to May 3.

Oracle decided that this Again Riddle vulnerability would not have CVE 
identifier and would be part of original The Riddle vulnerability 

I'm not sure if this is correct decision, as MariaDB 5.5 was not 
affected by The Riddle vulnerability, but is affected by Again Riddle.

I was told that prebuild binaries are not affected as they are compiled 
with SSL support, but lot of distributions compile libraries from source 
code by their own which means they could be affected.

I prepared POC program written in C to verify if system installed 
libmysqlclient.so library is vulnerable or not. You can find it on the 
new Again Riddle website together with some Q&A:

Comment 1 Marcus Meissner 2017-05-04 12:18:27 UTC
Yesterday Oracle released new MySQL 5.5.56 which disable compilation 
without SSL support, just to address this issue.

So it is not possible to compile MySQL without SSL support anymore.

Pali Rohár
Comment 2 Marcus Meissner 2017-05-04 14:13:31 UTC
see bug 1029396 for the original RIDDLE report. It seems 5.5.56 fixes both.
Comment 3 Kristyna Streitova 2017-05-05 15:07:02 UTC
As both mysql and mariadb packages in all our codestreams (openSUSE including) use 'DWITH_SSL=system' we shouldn't be affected by Again Riddle vulnerability.
Comment 5 Marcus Meissner 2017-06-22 20:23:00 UTC
i think so.