CVE-2009-3490: does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate

Related Vulnerabilities: CVE-2009-3490   CVE-2009-2408  

Debian Bug report logs - #549293
CVE-2009-3490: does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate

version graph

Package: wget; Maintainer for wget is Noël Köthe <noel@debian.org>; Source for wget is src:wget (PTS, buildd, popcon).

Reported by: Giuseppe Iuculano <giuseppe@iuculano.it>

Date: Fri, 2 Oct 2009 07:48:01 UTC

Severity: grave

Tags: security

Found in version wget/1.11.4-4

Fixed in versions wget/1.12-1, wget/1.11.4-2+lenny1, wget/1.10.2-2+etch4

Done: Giuseppe Iuculano <iuculano@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Noèl Köthe <noel@debian.org>:
Bug#549293; Package wget. (Fri, 02 Oct 2009 07:48:04 GMT) (full text, mbox, link).


Acknowledgement sent to Giuseppe Iuculano <giuseppe@iuculano.it>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Noèl Köthe <noel@debian.org>. (Fri, 02 Oct 2009 07:48:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Giuseppe Iuculano <giuseppe@iuculano.it>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2009-3490: does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate
Date: Fri, 02 Oct 2009 09:39:59 +0200
Package: wget
Version: 1.11.4-4
Severity: grave
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for wget.

CVE-2009-3490[0]:
| GNU Wget before 1.12 does not properly handle a '\0' character in a
| domain name in the Common Name field of an X.509 certificate, which
| allows man-in-the-middle remote attackers to spoof arbitrary SSL
| servers via a crafted certificate issued by a legitimate Certification
| Authority, a related issue to CVE-2009-2408.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3490
    http://security-tracker.debian.net/tracker/CVE-2009-3490


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkrFrkwACgkQNxpp46476aqi+gCePfmrLdxhk/yebah+M5rMO0uC
P3oAn3EA9CZ+IdC2g0Da3eIlIKLEtT8Q
=346W
-----END PGP SIGNATURE-----




Information forwarded to debian-bugs-dist@lists.debian.org, Noèl Köthe <noel@debian.org>:
Bug#549293; Package wget. (Fri, 02 Oct 2009 16:12:03 GMT) (full text, mbox, link).


Acknowledgement sent to Micah Cowan <micah@cowan.name>:
Extra info received and forwarded to list. Copy sent to Noèl Köthe <noel@debian.org>. (Fri, 02 Oct 2009 16:12:03 GMT) (full text, mbox, link).


Message #10 received at submit@bugs.debian.org (full text, mbox, reply):

From: Micah Cowan <micah@cowan.name>
To: Giuseppe Iuculano <giuseppe@iuculano.it>, 549293@bugs.debian.org
Cc: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: Re: Bug#549293: CVE-2009-3490: does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate
Date: Fri, 02 Oct 2009 08:12:27 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Giuseppe Iuculano wrote:
> Package: wget
> Version: 1.11.4-4
> Severity: grave
> Tags: security
> 
> 
> Hi,
> the following CVE (Common Vulnerabilities & Exposures) id was
> published for wget.
> 
> CVE-2009-3490[0]:
> | GNU Wget before 1.12 does not properly handle a '\0' character in a
> | domain name in the Common Name field of an X.509 certificate, which
> | allows man-in-the-middle remote attackers to spoof arbitrary SSL
> | servers via a crafted certificate issued by a legitimate Certification
> | Authority, a related issue to CVE-2009-2408.

Please note that upstream has already fixed this in Wget 1.12. If you
wish to apply it to Wget 1.11.4 (it should apply pretty cleanly), the
relevant changesets at http://hg.addictivecode.org/wget/mainline/ are:

2d8c76a23e7d   ( <-- the change itself )
f2d2ca32fd1b   ( <-- a message adjustment )
1eab157d3be7   ( <-- NEWS entry )

- --
HTH,
Micah J. Cowan
Programmer, musician, typesetting enthusiast, gamer.
Maintainer of GNU Wget and GNU Teseq
http://micah.cowan.name/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkrGGFsACgkQ7M8hyUobTrED5wCeK6GVNz/9CZIGzm/zTCbwrJqf
15gAniRRrXdkAvMEK3yc/8F6FlX8FsVG
=IogO
-----END PGP SIGNATURE-----





Information forwarded to debian-bugs-dist@lists.debian.org, Noèl Köthe <noel@debian.org>:
Bug#549293; Package wget. (Fri, 02 Oct 2009 16:12:05 GMT) (full text, mbox, link).


Acknowledgement sent to Micah Cowan <micah@cowan.name>:
Extra info received and forwarded to list. Copy sent to Noèl Köthe <noel@debian.org>. (Fri, 02 Oct 2009 16:12:05 GMT) (full text, mbox, link).


Reply sent to Noèl Köthe <noel@debian.org>:
You have taken responsibility. (Tue, 06 Oct 2009 20:30:42 GMT) (full text, mbox, link).


Notification sent to Giuseppe Iuculano <giuseppe@iuculano.it>:
Bug acknowledged by developer. (Tue, 06 Oct 2009 20:30:42 GMT) (full text, mbox, link).


Message #20 received at 549293-close@bugs.debian.org (full text, mbox, reply):

From: Noèl Köthe <noel@debian.org>
To: 549293-close@bugs.debian.org
Subject: Bug#549293: fixed in wget 1.12-1
Date: Tue, 06 Oct 2009 20:19:19 +0000
Source: wget
Source-Version: 1.12-1

We believe that the bug you reported is fixed in the latest version of
wget, which is due to be installed in the Debian FTP archive:

wget_1.12-1.diff.gz
  to pool/main/w/wget/wget_1.12-1.diff.gz
wget_1.12-1.dsc
  to pool/main/w/wget/wget_1.12-1.dsc
wget_1.12-1_amd64.deb
  to pool/main/w/wget/wget_1.12-1_amd64.deb
wget_1.12.orig.tar.gz
  to pool/main/w/wget/wget_1.12.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 549293@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Noèl Köthe <noel@debian.org> (supplier of updated wget package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 06 Oct 2009 21:00:30 +0200
Source: wget
Binary: wget
Architecture: source amd64
Version: 1.12-1
Distribution: unstable
Urgency: low
Maintainer: Noèl Köthe <noel@debian.org>
Changed-By: Noèl Köthe <noel@debian.org>
Description: 
 wget       - retrieves files from the web
Closes: 250670 288716 338326 405127 481064 528642 549293
Changes: 
 wget (1.12-1) unstable; urgency=low
 .
   * new upstream release from 2009-09-22
     - fix CVE-2009-3490 "does not properly handle a '\0' character in a
       domain name in the Common Name field of an X.509 certificate"
       closes: Bug#549293
     - updated config.{guess,sub} closes: Bug#528642
     - remove IPv4 precedence from wget closes: Bug#481064
     - support for IDN/IRI domains closes: Bug#405127
     - fix output of non-verbose spider mode closes: Bug#338326
     - fix --delete-after leaves robots.txt lying around
       closes: Bug#288716
     - fix misleading error message when using -O -
       closes: Bug#250670
   * debian/control updated Standards-Version to 3.8.3, no changes
Checksums-Sha1: 
 79024dce49a36ac37fb173a8a4631602ea059cf1 1021 wget_1.12-1.dsc
 50d4ed2441e67db7aa5061d8a4dde41ee0e94248 2464747 wget_1.12.orig.tar.gz
 e1e120f7c41041904afce19f22dc272387992d2d 37026 wget_1.12-1.diff.gz
 ab3fa69693051a8f901aea91767188104f59e567 761166 wget_1.12-1_amd64.deb
Checksums-Sha256: 
 0db3b186f6bdad355d3a6d2233291ab2b9430925e184736e293ea6966c4649a8 1021 wget_1.12-1.dsc
 7578ed0974e12caa71120581fa3962ee5a69f7175ddc3d6a6db0ecdcba65b572 2464747 wget_1.12.orig.tar.gz
 40badc69c7140173b277e439afaabfbfb0e943015f54811bd1449700ba626465 37026 wget_1.12-1.diff.gz
 d626475983a5e139c1280c3cca18309e9b6de9efa21362ef7c53e7cd37be0c04 761166 wget_1.12-1_amd64.deb
Files: 
 fab46e94c54fc0cf8c847b4f41f0de3e 1021 web important wget_1.12-1.dsc
 141461b9c04e454dc8933c9d1f2abf83 2464747 web important wget_1.12.orig.tar.gz
 ea67af0a9046ac1470d3d3c7b84bba54 37026 web important wget_1.12-1.diff.gz
 410e3e36d8dbea11a06b1e2d8fe6e214 761166 web important wget_1.12-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkrLovoACgkQ9/DnDzB9Vu2MfwCeJyH9YWZwdJCQolBBn9znLrH2
AxgAnROgmypAIZPQELO8ElP0LkgZUdBu
=Gns9
-----END PGP SIGNATURE-----





Reply sent to Giuseppe Iuculano <iuculano@debian.org>:
You have taken responsibility. (Sat, 10 Oct 2009 14:42:12 GMT) (full text, mbox, link).


Notification sent to Giuseppe Iuculano <giuseppe@iuculano.it>:
Bug acknowledged by developer. (Sat, 10 Oct 2009 14:42:13 GMT) (full text, mbox, link).


Message #25 received at 549293-close@bugs.debian.org (full text, mbox, reply):

From: Giuseppe Iuculano <iuculano@debian.org>
To: 549293-close@bugs.debian.org
Subject: Bug#549293: fixed in wget 1.11.4-2+lenny1
Date: Sat, 10 Oct 2009 13:58:25 +0000
Source: wget
Source-Version: 1.11.4-2+lenny1

We believe that the bug you reported is fixed in the latest version of
wget, which is due to be installed in the Debian FTP archive:

wget_1.11.4-2+lenny1.diff.gz
  to pool/main/w/wget/wget_1.11.4-2+lenny1.diff.gz
wget_1.11.4-2+lenny1.dsc
  to pool/main/w/wget/wget_1.11.4-2+lenny1.dsc
wget_1.11.4-2+lenny1_i386.deb
  to pool/main/w/wget/wget_1.11.4-2+lenny1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 549293@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Giuseppe Iuculano <iuculano@debian.org> (supplier of updated wget package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 08 Oct 2009 14:33:55 +0200
Source: wget
Binary: wget
Architecture: source i386
Version: 1.11.4-2+lenny1
Distribution: stable-security
Urgency: high
Maintainer: Noèl Köthe <noel@debian.org>
Changed-By: Giuseppe Iuculano <iuculano@debian.org>
Description: 
 wget       - retrieves files from the web
Closes: 549293
Changes: 
 wget (1.11.4-2+lenny1) stable-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * CVE-2009-3490: Fixed incorrect verification of SSL certificate with NUL in
     name (Closes: #549293)
Checksums-Sha1: 
 68a435009266d45c63616fa21ad8b269553f2861 1060 wget_1.11.4-2+lenny1.dsc
 a78a3b71fd59504df3ff3dbc0a2195a1410e9eac 1475149 wget_1.11.4.orig.tar.gz
 09a7219220058da94d05b1be677688441409ab72 17216 wget_1.11.4-2+lenny1.diff.gz
 efb63cd2cb8f0dd96d6b84dce616efacf2606033 608204 wget_1.11.4-2+lenny1_i386.deb
Checksums-Sha256: 
 b9e72374132e8cbd963f39e60ca772d77dfc0c535fee7f7ffdec815f653f8097 1060 wget_1.11.4-2+lenny1.dsc
 7315963b6eefb7530b4a4f63a5d5ccdab30078784cf41ccb5297873f9adea2f3 1475149 wget_1.11.4.orig.tar.gz
 ea8c2c46070bbf120274c4b9bfadbf982702eaacde314f03102feeb9ce77cb51 17216 wget_1.11.4-2+lenny1.diff.gz
 d88f10c351243752f0185f1a60893d200bb46edd1321a7bc8a82fbcba8f5e6a7 608204 wget_1.11.4-2+lenny1_i386.deb
Files: 
 ae958363f4aca0f82943525780a37f92 1060 web important wget_1.11.4-2+lenny1.dsc
 69e8a7296c0e12c53bd9ffd786462e87 1475149 web important wget_1.11.4.orig.tar.gz
 0052572de990c970b9514069710d9110 17216 web important wget_1.11.4-2+lenny1.diff.gz
 496dee8ea297c44aebddb3d06edb523f 608204 web important wget_1.11.4-2+lenny1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkrN4yEACgkQNxpp46476ar4qwCgkjjtU08RuHIRa8kDwSznygyR
IbUAoIixahEgLUe/PZt7txmkm2F1m54r
=AP9Q
-----END PGP SIGNATURE-----





Reply sent to Giuseppe Iuculano <iuculano@debian.org>:
You have taken responsibility. (Mon, 19 Oct 2009 02:12:03 GMT) (full text, mbox, link).


Notification sent to Giuseppe Iuculano <giuseppe@iuculano.it>:
Bug acknowledged by developer. (Mon, 19 Oct 2009 02:12:03 GMT) (full text, mbox, link).


Message #30 received at 549293-close@bugs.debian.org (full text, mbox, reply):

From: Giuseppe Iuculano <iuculano@debian.org>
To: 549293-close@bugs.debian.org
Subject: Bug#549293: fixed in wget 1.10.2-2+etch4
Date: Mon, 19 Oct 2009 01:58:06 +0000
Source: wget
Source-Version: 1.10.2-2+etch4

We believe that the bug you reported is fixed in the latest version of
wget, which is due to be installed in the Debian FTP archive:

wget_1.10.2-2+etch4.diff.gz
  to pool/main/w/wget/wget_1.10.2-2+etch4.diff.gz
wget_1.10.2-2+etch4.dsc
  to pool/main/w/wget/wget_1.10.2-2+etch4.dsc
wget_1.10.2-2+etch4_i386.deb
  to pool/main/w/wget/wget_1.10.2-2+etch4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 549293@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Giuseppe Iuculano <iuculano@debian.org> (supplier of updated wget package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 08 Oct 2009 13:44:36 +0200
Source: wget
Binary: wget
Architecture: source i386
Version: 1.10.2-2+etch4
Distribution: oldstable-security
Urgency: high
Maintainer: Noèl Köthe <noel@debian.org>
Changed-By: Giuseppe Iuculano <iuculano@debian.org>
Description: 
 wget       - retrieves files from the web
Closes: 549293
Changes: 
 wget (1.10.2-2+etch4) oldstable-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * CVE-2009-3490: Fixed incorrect verification of SSL certificate with NUL in
     name (Closes: #549293)
Files: 
 8e9e518014d108e22e446d575e9e1168 630 web important wget_1.10.2-2+etch4.dsc
 795fefbb7099f93e2d346b026785c4b8 1213056 web important wget_1.10.2.orig.tar.gz
 116250977db43cb1981600c9722b7faa 17947 web important wget_1.10.2-2+etch4.diff.gz
 3dc181c1b15d6ed6bdbd7444eb6881fe 612200 web important wget_1.10.2-2+etch4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkrN0kQACgkQNxpp46476ar7DACfZRXw4IuNh4jDGcqTcUgVS8PH
KEIAn0TWjr1z///p39tK0hTdMNNvk20S
=14d2
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Tue, 16 Aug 2011 07:36:56 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:37:12 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.