Issue 8543 - CVE-2015-3276: incorrect multi-keyword mode cipherstring parsing
Summary: CVE-2015-3276: incorrect multi-keyword mode cipherstring parsing
Status: VERIFIED WONTFIX
Alias: None
Product: OpenLDAP
Classification: Unclassified
Component: slapd (show other issues)
Version: 2.4.44
Hardware: All All
: --- normal
Target Milestone: ---
Assignee: OpenLDAP project
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2016-12-13 10:18 UTC by he@netbsd.org
Modified: 2020-03-23 00:06 UTC (History)
0 users

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this issue.
Description he@netbsd.org 2016-12-13 10:18:17 UTC
Full_Name: Havard Eidnes
Version: 2.4.44
OS: NetBSD
URL: 
Submission from: (NULL) (2001:700:1:0:eeb1:d7ff:fe59:fbaa)


Hi,

CVE-2015-3276 appears to be unfixed in 2.4.44, and from several
attempts at finding the bug reported in your mailing list archive
I came up empty.  So ...  The best I've found from this CVE is
RedHat's bugzilla entry at

https://bugzilla.redhat.com/show_bug.cgi?id=1238322

which contains a (suggested) patch.

Summarized:

   The openldap (for NSS) emulation of the openssl cipherstring parsing code
   incorrectly implements the multi-keyword mode.
   As a consequence anyone using a combination like:

      ECDH+SHA

   will not get the expected set of ciphers [...]

(I'm somewhat dismayed that this was apparently not reported upstream
earlier...)

Best regards,

- H�vard
Comment 1 Howard Chu 2016-12-13 10:44:11 UTC
he@NetBSD.org wrote:
> Full_Name: Havard Eidnes
> Version: 2.4.44
> OS: NetBSD
> URL:
> Submission from: (NULL) (2001:700:1:0:eeb1:d7ff:fe59:fbaa)
>
>
> Hi,
>
> CVE-2015-3276 appears to be unfixed in 2.4.44, and from several
> attempts at finding the bug reported in your mailing list archive
> I came up empty.  So ...  The best I've found from this CVE is
> RedHat's bugzilla entry at
>
> https://bugzilla.redhat.com/show_bug.cgi?id=1238322
>
> which contains a (suggested) patch.

We can integrate a suggested fix if the patch author submits their patch to 
our ITS directly. Due to IPR concerns we don't accept or act on 3rd party 
patch submissions.
>
> Summarized:
>
>    The openldap (for NSS) emulation of the openssl cipherstring parsing code
>    incorrectly implements the multi-keyword mode.
>    As a consequence anyone using a combination like:
>
>       ECDH+SHA
>
>    will not get the expected set of ciphers [...]
>
> (I'm somewhat dismayed that this was apparently not reported upstream
> earlier...)
>
> Best regards,
>
> - Håvard
>
>
>


-- 
   -- Howard Chu
   CTO, Symas Corp.           http://www.symas.com
   Director, Highland Sun     http://highlandsun.com/hyc/
   Chief Architect, OpenLDAP  http://www.openldap.org/project/

Comment 2 Quanah Gibson-Mount 2016-12-13 21:26:31 UTC
--On Tuesday, December 13, 2016 10:44 AM +0000 hyc@symas.com wrote:

> he@NetBSD.org wrote:
>> Full_Name: Havard Eidnes
>> Version: 2.4.44
>> OS: NetBSD
>> URL:
>> Submission from: (NULL) (2001:700:1:0:eeb1:d7ff:fe59:fbaa)
>>
>>
>> Hi,
>>
>> CVE-2015-3276 appears to be unfixed in 2.4.44, and from several
>> attempts at finding the bug reported in your mailing list archive
>> I came up empty.  So ...  The best I've found from this CVE is
>> RedHat's bugzilla entry at
>>
>> https://bugzilla.redhat.com/show_bug.cgi?id=3D1238322
>>
>> which contains a (suggested) patch.
>
> We can integrate a suggested fix if the patch author submits their patch =
> to=20
> our ITS directly. Due to IPR concerns we don't accept or act on 3rd party=
> =20
> patch submissions.

I would also note that MozNSS is not an officially supported TLS library 
for OpenLDAP, and the hack that was added for 2.4 will be removed in the 
future (likely OpenLDAP 2.5 and later).  End administrators should 
generally avoid MozNSS entirely.

Regards,
Quanah

--

Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
<http://www.symas.com>


Comment 3 he@netbsd.org 2016-12-14 12:45:09 UTC
>> CVE-2015-3276 appears to be unfixed in 2.4.44, and from several
>> attempts at finding the bug reported in your mailing list archive
>> I came up empty.  So ...  The best I've found from this CVE is
>> RedHat's bugzilla entry at
>>
>> https://bugzilla.redhat.com/show_bug.cgi?id=1238322
>>
>> which contains a (suggested) patch.
>
> We can integrate a suggested fix if the patch author submits their
> patch to our ITS directly. Due to IPR concerns we don't accept or act
> on 3rd party patch submissions.

Hm, ok.  I've submitted an update to the above bug entry
petitioning for them to release the fix.  We'll see if they act
on it.

Regards,

- Håvard

Comment 4 Quanah Gibson-Mount 2017-03-17 22:12:00 UTC
moved from Incoming to Software Bugs
Comment 5 Quanah Gibson-Mount 2020-03-23 00:06:44 UTC
MozNSS deprecated for 2.4, being removed for 2.5