OpenBSD Journal

OpenSSL CVE-2008-5077: Incorrect checks for malformed signatures

Contributed by ray on from the CYA dept.

Damien Miller (djm@) wrote to security-announce:

Some exploitable logic errors have been discovered in OpenSSL versions prior to 0.9.8j. These errors may permit an attacker to bypass validation of DSA/ECDSA certificates and conduct a "man in the middle attack" against SSL/TLS connection that use them. Fortunately, DSA and ECDSA certificates appear to be rarely used in practice.

This vulnerability has been designated CVE-2008-5077. More information is available from the OpenSSL project at:

http://www.openssl.org/news/secadv_20090107.txt
Source code patches are available for OpenBSD 4.3 and 4.4. -current has been updated to OpenSSL 0.9.8j

Patch for OpenBSD 4.3:

ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/007_openssl.patch

Patch for OpenBSD 4.4:

ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.4/common/007_openssl.patch

These patches are also available in the OPENBSD_4_3 and OPENBSD_4_4 stable CVS branches.

Thanks Damien for the update. Start your patching!

(Comments are closed)


Comments
  1. By Anonymous Coward (87.106.79.175) on

    Thanks for updating it so quickly Damien! :-)

    Are there any patches for Bind required as well on OpenBSD?
    Bind issued an update as well.


    Thanks again for spending the time Demien!

  2. By raw foo (80.249.194.29) on

    can't be bothered...

  3. By m (84.42.224.177) on

    Hi, I know, I know. OpenBSD 4.2 is no supported anymore and I should upgrade ASAP but ... is the patch available for 4.2?
    Thx

    Comments
    1. By Anonymous Coward (99.231.50.3) on

      > is the patch available for 4.2?

      You could try the 4.3 patch on the 4.2 tree but you can't be sure it won't silently break something unless you know what you're doing.

      However, it's harder to maintain an unsupported system than to upgrade to one that is supported, even if you do know what you're doing.

      Comments
      1. By Anonymous Coward (71.126.39.55) on

        > > is the patch available for 4.2?
        >
        > You could try the 4.3 patch on the 4.2 tree but you can't be sure it won't silently break something unless you know what you're doing.

        The patches for OpenBSD 4.4 and 4.3 are identical in this case (except for the timestamps on the patches, of course). Furthermore, the files that are patched

         http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/apps/speed.c
         http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/apps/spkac.c
         http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/apps/verify.c
         http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/apps/x509.c
         http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/s2_clnt.c
         http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/s2_srvr.c
         http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/s3_clnt.c
         http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/s3_srvr.c
         http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/ssltest.c
        
        did not change between OpenBSD 4.1 and 4.3. So, it's a pretty safe bet that the patches will also work on older versions of OpenBSD as far back as 4.1.

  4. By Anonymous Coward (194.126.214.2) on

    Why this patch isn't listed at http://openbsd.org/errata44.html and http://openbsd.org/errata43.html ?

    Comments
    1. Comments
      1. By tedu (udet) on

        > > Why this patch isn't listed at http://openbsd.org/errata44.html and http://openbsd.org/errata43.html ?
        >
        >
        > Try http://www.openbsd.org/errata43.html
        > and http://www.openbsd.org/errata44.html

        woah, use the right address and you get the right info. who'd a thunk it?

        Comments
        1. By Brad (2001:470:b01e:3:216:41ff:fe17:6933) brad at comstyle dot com on

          > > > Why this patch isn't listed at http://openbsd.org/errata44.html and http://openbsd.org/errata43.html ?
          > >
          > >
          > > Try http://www.openbsd.org/errata43.html
          > > and http://www.openbsd.org/errata44.html
          >
          > woah, use the right address and you get the right info. who'd a thunk it?

          That would imply the address is "wrong" which it is not. The real problem is that cvs needs to have its web root synced up.

Credits

Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]