Bug 938567 - (CVE-2015-3277) VUL-0: CVE-2015-3276: openldap2,openldap2-client,openldap2-client-openssl1: incorrect multi-keyword mode cipherstring parsing
(CVE-2015-3277)
VUL-0: CVE-2015-3276: openldap2,openldap2-client,openldap2-client-openssl1: i...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Peter Varkoly
Security Team bot
https://smash.suse.de/issue/118779/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2015-07-17 12:14 UTC by Andreas Stieger
Modified: 2015-07-24 09:23 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-07-17 12:14:15 UTC
via RH:

The openldap (for NSS) emulation of the openssl cipherstring parsing code
incorrectly implements the multi-keyword mode.
As a consequence anyone using a combination like:

  ECDH+SHA

will not get the expected set of ciphers

  ECDH-RSA-RC4-SHA
  ECDH-RSA-DES-CBC3-SHA
  ECDH-RSA-AES128-SHA
  ECDH-RSA-AES256-SHA
  ECDH-ECDSA-RC4-SHA
  ECDH-ECDSA-DES-CBC3-SHA
  ECDH-ECDSA-AES128-SHA
  ECDH-ECDSA-AES256-SHA
  ECDHE-RSA-RC4-SHA
  ECDHE-RSA-DES-CBC3-SHA
  ECDHE-RSA-AES128-SHA
  ECDHE-RSA-AES256-SHA
  ECDHE-ECDSA-RC4-SHA
  ECDHE-ECDSA-DES-CBC3-SHA
  ECDHE-ECDSA-AES128-SHA
  ECDHE-ECDSA-AES256-SHA

but instead will match

  DES-CBC-SHA
  DES-CBC3-SHA
  RC4-SHA
  EDH-RSA-DES-CBC-SHA
  EDH-RSA-DES-CBC3-SHA
  EDH-DSS-DES-CBC-SHA
  EDH-DSS-DES-CBC3-SHA
  EXP1024-DES-CBC-SHA
  EXP1024-RC4-SHA
  SEED-SHA
  AES128-SHA
  AES256-SHA
  CAMELLIA256-SHA
  CAMELLIA128-SHA
  DHE-RSA-AES128-SHA
  DHE-RSA-AES256-SHA
  DHE-RSA-CAMELLIA128-SHA
  DHE-RSA-CAMELLIA256-SHA
  DHE-DSS-RC4-SHA
  DHE-DSS-AES128-SHA
  DHE-DSS-AES256-SHA
  DHE-DSS-CAMELLIA128-SHA
  DHE-DSS-CAMELLIA256-SHA
  ECDH-RSA-RC4-SHA
  ECDH-RSA-DES-CBC3-SHA
  ECDH-RSA-AES128-SHA
  ECDH-RSA-AES256-SHA
  ECDH-ECDSA-RC4-SHA
  ECDH-ECDSA-DES-CBC3-SHA
  ECDH-ECDSA-AES128-SHA
  ECDH-ECDSA-AES256-SHA
  ECDHE-RSA-RC4-SHA
  ECDHE-RSA-DES-CBC3-SHA
  ECDHE-RSA-AES128-SHA
  ECDHE-RSA-AES256-SHA
  ECDHE-ECDSA-RC4-SHA
  ECDHE-ECDSA-DES-CBC3-SHA
  ECDHE-ECDSA-AES128-SHA
  ECDHE-ECDSA-AES256-SHA

Acknowledgements:

Red Hat would like to thank Martin Poole of Software Maintenance Engineering group for reporting this issue.


Suggested patches are attached in https://bugzilla.redhat.com/show_bug.cgi?id=1231522
(not publicly accessible)


References:
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://bugzilla.redhat.com/show_bug.cgi?id=1238324
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3277
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3276
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3277.html
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3276.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3277
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3276
Comment 1 Swamp Workflow Management 2015-07-17 22:00:08 UTC
bugbot adjusting priority
Comment 2 Marcus Meissner 2015-07-18 10:31:31 UTC
we are using openldap2 with the openssl SSL implementation, not the NSS implementation.

But interesting that there is one, we could have done TLS 1.2 support easier apparently....
Comment 3 Johannes Segitz 2015-07-24 09:23:45 UTC
then we can close this