Bugzilla – Bug 938567
VUL-0: CVE-2015-3276: openldap2,openldap2-client,openldap2-client-openssl1: incorrect multi-keyword mode cipherstring parsing
Last modified: 2015-07-24 09:23:45 UTC
via RH: The openldap (for NSS) emulation of the openssl cipherstring parsing code incorrectly implements the multi-keyword mode. As a consequence anyone using a combination like: ECDH+SHA will not get the expected set of ciphers ECDH-RSA-RC4-SHA ECDH-RSA-DES-CBC3-SHA ECDH-RSA-AES128-SHA ECDH-RSA-AES256-SHA ECDH-ECDSA-RC4-SHA ECDH-ECDSA-DES-CBC3-SHA ECDH-ECDSA-AES128-SHA ECDH-ECDSA-AES256-SHA ECDHE-RSA-RC4-SHA ECDHE-RSA-DES-CBC3-SHA ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA ECDHE-ECDSA-RC4-SHA ECDHE-ECDSA-DES-CBC3-SHA ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA but instead will match DES-CBC-SHA DES-CBC3-SHA RC4-SHA EDH-RSA-DES-CBC-SHA EDH-RSA-DES-CBC3-SHA EDH-DSS-DES-CBC-SHA EDH-DSS-DES-CBC3-SHA EXP1024-DES-CBC-SHA EXP1024-RC4-SHA SEED-SHA AES128-SHA AES256-SHA CAMELLIA256-SHA CAMELLIA128-SHA DHE-RSA-AES128-SHA DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA128-SHA DHE-RSA-CAMELLIA256-SHA DHE-DSS-RC4-SHA DHE-DSS-AES128-SHA DHE-DSS-AES256-SHA DHE-DSS-CAMELLIA128-SHA DHE-DSS-CAMELLIA256-SHA ECDH-RSA-RC4-SHA ECDH-RSA-DES-CBC3-SHA ECDH-RSA-AES128-SHA ECDH-RSA-AES256-SHA ECDH-ECDSA-RC4-SHA ECDH-ECDSA-DES-CBC3-SHA ECDH-ECDSA-AES128-SHA ECDH-ECDSA-AES256-SHA ECDHE-RSA-RC4-SHA ECDHE-RSA-DES-CBC3-SHA ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA ECDHE-ECDSA-RC4-SHA ECDHE-ECDSA-DES-CBC3-SHA ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA Acknowledgements: Red Hat would like to thank Martin Poole of Software Maintenance Engineering group for reporting this issue. Suggested patches are attached in https://bugzilla.redhat.com/show_bug.cgi?id=1231522 (not publicly accessible) References: https://bugzilla.redhat.com/show_bug.cgi?id=1238322 https://bugzilla.redhat.com/show_bug.cgi?id=1238324 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3277 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3276 http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3277.html http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3276.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3277 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3276
bugbot adjusting priority
we are using openldap2 with the openssl SSL implementation, not the NSS implementation. But interesting that there is one, we could have done TLS 1.2 support easier apparently....
then we can close this