[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] mbed TLS: CVE-2017-14032: Bypass of authentication of peer possible when the authenti
From:       Salvatore Bonaccorso <carnil () debian ! org>
Date:       2017-08-30 20:03:46
Message-ID: 20170830200346.dhmg6koiwpn3rauh () eldamar ! local
[Download RAW message or body]

Hi

MITRE has assigned CVE-2017-14032 for the following issue in mbed TLS:

https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-02

>   Title     Bypass of authentication of peer possible when the authentication
>                             mode is configured as 'optional'
> Date      28th August 2017
> Affects   All versions of mbed TLS from version 1.3.10 and up, including all
>           2.1 and later releases
> Not       mbed TLS 1.3.9 and earlier
> affected
> Impact    Use of the 'optional' authentication mode can permit the peer to
>           bypass peer authentication
> Severity  High
> 
> Vulnerability
> -------------
> If a malicious peer supplies an X.509 certificate chain that has more than
> MBEDTLS_X509_MAX_INTERMEDIATE_CA intermediates (which by default is 8), it
> could bypass authentication of the certificates, when the authentication mode
> was set to 'optional' eg. MBEDTLS_SSL_VERIFY_OPTIONAL. The issue could be
> triggered remotely by both the client and server sides.
> 
> If the authentication mode, which can be set by the function
> mbedtls_ssl_conf_authmode(), was set to 'required' eg.
> MBEDTLS_SSL_VERIFY_REQUIRED which is the default, authentication would occur
> normally as intended.
> 
> Impact
> ------
> Depending on the platform, an attack exploiting this vulnerability could allow
> successful impersonation of the intended peer and permit man-in-the-middle
> attacks.
> 
> Resolution
> ----------
> Affected users should upgrade to mbed TLS 1.3.21, mbed TLS 2.1.9 or mbed TLS
> 2.6.0.
> 
> Workaround
> ----------
> Users should wherever possible upgrade to the newer version of mbed TLS. Where
> this is not practical, users should consider if changing the authentication to
> the 'required' mode MBEDTLS_SSL_VERIFY_REQUIRED is practical for their
> application.

References:
 -  https://github.com/ARMmbed/mbedtls/commit/31458a18788b0cf0b722acda9bb2f2fe13a3fb32
 - https://github.com/ARMmbed/mbedtls/commit/d15795acd5074e0b44e71f7ede8bdfe1b48591fc
 - https://bugs.debian.org/873557

Regards,
Salvatore
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic