CVE-2010-2074

Related Vulnerabilities: CVE-2010-2074  

Debian Bug report logs - #587445
CVE-2010-2074

version graph

Package: w3m; Maintainer for w3m is Tatsuya Kinoshita <tats@debian.org>; Source for w3m is src:w3m (PTS, buildd, popcon).

Reported by: Moritz Muehlenhoff <jmm@debian.org>

Date: Mon, 28 Jun 2010 17:33:02 UTC

Severity: grave

Tags: patch, security

Fixed in version w3m/0.5.2-5

Done: Tatsuya Kinoshita <tats@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Tatsuya Kinoshita <tats@debian.org>:
Bug#587445; Package w3m. (Mon, 28 Jun 2010 17:33:04 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Muehlenhoff <jmm@debian.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Tatsuya Kinoshita <tats@debian.org>. (Mon, 28 Jun 2010 17:33:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Moritz Muehlenhoff <jmm@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2010-2074
Date: Mon, 28 Jun 2010 19:31:07 +0200
Package: w3m
Severity: grave
Tags: security

Hi,
several applications fail to correct SSL certificates properly
and w3m is among them:
http://www.openwall.com/lists/oss-security/2010/06/14/4

This has been assigned CVE-2010-2074.

The impact of this bug doesn't warrant a DSA, but you can still
fix in in Lenny through a stable point update:
http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable

Cheers,
        Moritz

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=de_DE.ISO-8859-15@euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages w3m depends on:
ii  libc6                   2.10.2-9         Embedded GNU C Library: Shared lib
pn  libgc1c2                <none>           (no description available)
ii  libgpm2                 1.20.4-3.3       General Purpose Mouse - shared lib
ii  libncurses5             5.7+20100313-2   shared libraries for terminal hand
ii  libssl0.9.8             0.9.8n-1         SSL shared libraries
ii  zlib1g                  1:1.2.3.4.dfsg-3 compression library - runtime

Versions of packages w3m recommends:
ii  ca-certificates               20090814   Common CA certificates

Versions of packages w3m suggests:
ii  man-db                        2.5.7-3    on-line manual pager
ii  menu                          2.1.43     generates programs menu for all me
pn  migemo                        <none>     (no description available)
ii  mime-support                  3.48-1     MIME files 'mime.types' & 'mailcap
pn  w3m-el                        <none>     (no description available)
pn  w3m-img                       <none>     (no description available)




Information forwarded to debian-bugs-dist@lists.debian.org, Tatsuya Kinoshita <tats@debian.org>:
Bug#587445; Package w3m. (Sat, 03 Jul 2010 05:39:03 GMT) (full text, mbox, link).


Acknowledgement sent to d+deb@vdr.jp:
Extra info received and forwarded to list. Copy sent to Tatsuya Kinoshita <tats@debian.org>. (Sat, 03 Jul 2010 05:39:03 GMT) (full text, mbox, link).


Message #10 received at 587445@bugs.debian.org (full text, mbox, reply):

From: d+deb@vdr.jp
To: 587445@bugs.debian.org
Cc: control@bugs.debian.org
Subject: Re: CVE-2010-2074
Date: Sat, 3 Jul 2010 14:37:35 +0900
[Message part 1 (text/plain, inline)]
tags 587445 + patch
thanks

CVE-2010-2074 w3m: doesn't handle NULL in Common Name properly
https://bugzilla.redhat.com/show_bug.cgi?id=604855#c2
> check for null bytes in CN/subjAltName
> 
> Patch provided by Ludwig Nussel from the SUSE security team.
-- 
Regards,
	dai

GPG Fingerprint = 0B29 D88E 42E6 B765 B8D8 EA50 7839 619D D439 668E
[signature.asc (application/pgp-signature, inline)]

Added tag(s) patch. Request was from d+deb@vdr.jp to control@bugs.debian.org. (Sat, 03 Jul 2010 05:39:05 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#587445; Package w3m. (Sat, 03 Jul 2010 12:51:04 GMT) (full text, mbox, link).


Acknowledgement sent to Tatsuya Kinoshita <tats@debian.org>:
Extra info received and forwarded to list. (Sat, 03 Jul 2010 12:51:05 GMT) (full text, mbox, link).


Message #17 received at 587445@bugs.debian.org (full text, mbox, reply):

From: Tatsuya Kinoshita <tats@debian.org>
To: jmm@debian.org, 587445@bugs.debian.org
Cc: debian-release@lists.debian.org
Subject: Re: Bug#587445: CVE-2010-2074
Date: Sat, 03 Jul 2010 21:45:41 +0900 (JST)
[Message part 1 (text/plain, inline)]
On June 28, 2010 at 7:31PM +0200,
jmm (at debian.org) wrote:

> Package: w3m
> Severity: grave
> Tags: security
>
> Hi,
> several applications fail to correct SSL certificates properly
> and w3m is among them:
> http://www.openwall.com/lists/oss-security/2010/06/14/4
>
> This has been assigned CVE-2010-2074.
>
> The impact of this bug doesn't warrant a DSA, but you can still
> fix in in Lenny through a stable point update:
> http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable

OK, I'll upload w3m 0.5.2-2+lenny1 to stable with the attached patch.

 w3m (0.5.2-2+lenny1) stable; urgency=high
 .
   * debian/patches/60_check-null-cn.patch: Patch to check for null bytes
     in CN/subjAltName, provided by Ludwig Nussel. [CVE-2010-2074]

Thanks,
--
Tatsuya Kinoshita
[w3m-0.5.2-2+lenny1.patch (text/x-patch, inline)]
diff -urN w3m-0.5.2-2/debian/changelog w3m-0.5.2/debian/changelog
--- w3m-0.5.2-2/debian/changelog	2010-07-03 20:52:47.000000000 +0900
+++ w3m-0.5.2/debian/changelog	2010-07-03 20:54:45.000000000 +0900
@@ -1,3 +1,10 @@
+w3m (0.5.2-2+lenny1) stable; urgency=high
+
+  * debian/patches/60_check-null-cn.patch: Patch to check for null bytes
+    in CN/subjAltName, provided by Ludwig Nussel. [CVE-2010-2074]
+
+ -- Tatsuya Kinoshita <tats@debian.org>  Sat, 03 Jul 2010 20:53:06 +0900
+
 w3m (0.5.2-2) unstable; urgency=low

   * debian/control:
diff -urN w3m-0.5.2-2/debian/patches/60_check-null-cn.patch w3m-0.5.2/debian/patches/60_check-null-cn.patch
--- w3m-0.5.2-2/debian/patches/60_check-null-cn.patch	1970-01-01 09:00:00.000000000 +0900
+++ w3m-0.5.2/debian/patches/60_check-null-cn.patch	2010-07-03 18:40:03.000000000 +0900
@@ -0,0 +1,57 @@
+Description: Check for null bytes in CN/subjAltName
+Origin: http://www.openwall.com/lists/oss-security/2010/06/14/4
+Author: Ludwig Nussel <ludwig.nussel@suse.de>
+Bug-Debian: http://bugs.debian.org/587445
+
+--- w3m-0.5.2.orig/istream.c
++++ w3m-0.5.2/istream.c
+@@ -447,8 +447,17 @@ ssl_check_cert_ident(X509 * x, char *hos
+
+ 		    if (!seen_dnsname)
+ 			seen_dnsname = Strnew();
++		    /* replace \0 to make full string visible to user */
++		    if (sl != strlen(sn)) {
++			int i;
++			for (i = 0; i < sl; ++i) {
++			    if (!sn[i])
++				sn[i] = '!';
++			}
++		    }
+ 		    Strcat_m_charp(seen_dnsname, sn, " ", NULL);
+-		    if (ssl_match_cert_ident(sn, sl, hostname))
++		    if (sl == strlen(sn) /* catch \0 in SAN */
++			&& ssl_match_cert_ident(sn, sl, hostname))
+ 			break;
+ 		}
+ 	    }
+@@ -466,16 +475,27 @@ ssl_check_cert_ident(X509 * x, char *hos
+     if (match_ident == FALSE && ret == NULL) {
+ 	X509_NAME *xn;
+ 	char buf[2048];
++	int slen;
+
+ 	xn = X509_get_subject_name(x);
+
+-	if (X509_NAME_get_text_by_NID(xn, NID_commonName,
+-				      buf, sizeof(buf)) == -1)
++	slen = X509_NAME_get_text_by_NID(xn, NID_commonName, buf, sizeof(buf));
++	if ( slen == -1)
+ 	    /* FIXME: gettextize? */
+ 	    ret = Strnew_charp("Unable to get common name from peer cert");
+-	else if (!ssl_match_cert_ident(buf, strlen(buf), hostname))
++	else if (slen != strlen(buf)
++		|| !ssl_match_cert_ident(buf, strlen(buf), hostname)) {
++	    /* replace \0 to make full string visible to user */
++	    if (slen != strlen(buf)) {
++		int i;
++		for (i = 0; i < slen; ++i) {
++		    if (!buf[i])
++			buf[i] = '!';
++		}
++	    }
+ 	    /* FIXME: gettextize? */
+ 	    ret = Sprintf("Bad cert ident %s from %s", buf, hostname);
++	}
+ 	else
+ 	    match_ident = TRUE;
+     }
diff -urN w3m-0.5.2-2/debian/patches/series w3m-0.5.2/debian/patches/series
--- w3m-0.5.2-2/debian/patches/series	2010-07-03 20:52:47.000000000 +0900
+++ w3m-0.5.2/debian/patches/series	2010-07-03 20:52:16.000000000 +0900
@@ -1,3 +1,4 @@
 03-w3m.1-debian-fix
 04-ja-w3m.1-debian-fix
 05-config-debian-fix
+60_check-null-cn.patch
[Message part 3 (application/pgp-signature, inline)]

Reply sent to Tatsuya Kinoshita <tats@debian.org>:
You have taken responsibility. (Sat, 03 Jul 2010 16:57:13 GMT) (full text, mbox, link).


Notification sent to Moritz Muehlenhoff <jmm@debian.org>:
Bug acknowledged by developer. (Sat, 03 Jul 2010 16:57:13 GMT) (full text, mbox, link).


Message #22 received at 587445-close@bugs.debian.org (full text, mbox, reply):

From: Tatsuya Kinoshita <tats@debian.org>
To: 587445-close@bugs.debian.org
Subject: Bug#587445: fixed in w3m 0.5.2-5
Date: Sat, 03 Jul 2010 16:54:07 +0000
Source: w3m
Source-Version: 0.5.2-5

We believe that the bug you reported is fixed in the latest version of
w3m, which is due to be installed in the Debian FTP archive:

w3m-img_0.5.2-5_i386.deb
  to main/w/w3m/w3m-img_0.5.2-5_i386.deb
w3m_0.5.2-5.debian.tar.gz
  to main/w/w3m/w3m_0.5.2-5.debian.tar.gz
w3m_0.5.2-5.dsc
  to main/w/w3m/w3m_0.5.2-5.dsc
w3m_0.5.2-5_i386.deb
  to main/w/w3m/w3m_0.5.2-5_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 587445@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Tatsuya Kinoshita <tats@debian.org> (supplier of updated w3m package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sat, 03 Jul 2010 19:08:07 +0900
Source: w3m
Binary: w3m w3m-img
Architecture: source i386
Version: 0.5.2-5
Distribution: unstable
Urgency: high
Maintainer: Tatsuya Kinoshita <tats@debian.org>
Changed-By: Tatsuya Kinoshita <tats@debian.org>
Description: 
 w3m        - WWW browsable pager with excellent tables/frames support
 w3m-img    - inline image extension support utilities for w3m
Closes: 587445
Changes: 
 w3m (0.5.2-5) unstable; urgency=high
 .
   * debian/patches/60_check-null-cn.patch: Patch to check for null bytes
     in CN/subjAltName, provided by Ludwig Nussel. (Closes: #587445)
     [CVE-2010-2074]
   * debian/patches/70_ssl-init.patch: Patch to force ssl_verify_server on
     and disable SSLv2 support, provided by Ludwig Nussel.
   * debian/patches/*: Renumbered.
   * debian/control: Update Standards-Version to 3.9.0.
Checksums-Sha1: 
 7f8c1dc0fe55f3f8f9e2d3459abf7e45aed36a8a 1136 w3m_0.5.2-5.dsc
 c1896fcf36078cb20c85a309fe6dd3dd43269557 40778 w3m_0.5.2-5.debian.tar.gz
 aec127ac1cb1697fc9d0d09e063d839f888eba6c 1113178 w3m_0.5.2-5_i386.deb
 383e1313a5b48749b8a6abfefced3b1ae1c8be8d 96906 w3m-img_0.5.2-5_i386.deb
Checksums-Sha256: 
 6f0d19670c5df5a3a5a4a8a3b8b7cc34a8b6fa15e8b4ded547e2a7544a6be0cc 1136 w3m_0.5.2-5.dsc
 f55a749e52faa08c3d4202729aa3a75c06c5e58b75177d68ebfa97421b7ff018 40778 w3m_0.5.2-5.debian.tar.gz
 3b26ac35f09596a1f8d7bacf456f6379f1b2eb90844daf9e969277356f21fc62 1113178 w3m_0.5.2-5_i386.deb
 d859fad5959e6834f732836fcca1033f2b5234fadd9819405e5d4f914a7c92cd 96906 w3m-img_0.5.2-5_i386.deb
Files: 
 ba9c257d38e534b612c14da17c1f0a3c 1136 web standard w3m_0.5.2-5.dsc
 721e705d8b7376b0bb67fb8deec9dfba 40778 web standard w3m_0.5.2-5.debian.tar.gz
 c720053bdc5a7faf73e8c9f0c741b142 1113178 web standard w3m_0.5.2-5_i386.deb
 2617b6978cfc04d9d7541629f096114e 96906 web optional w3m-img_0.5.2-5_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkwvEB8ACgkQgV4LPvpMUpi87wCePaAbA84aAq9SfLs72hB+KFud
41kAn1cEe6Z3Kzv5xLet4EIUPLNizoSg
=pv7l
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 05 Sep 2010 07:36:29 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:03:34 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.