tags 444435 - sarge etch
clone 444435 -1 
reassign -1 openssl097 0.9.7k-3.1
thanks

On Fri, Sep 28, 2007 at 04:16:02PM +0200, Axel Beckert wrote:
> Package: openssl
> Version: 0.9.8c-4, 0.9.7e-3sarge4
> Severity: critical
> Tags: sarge, etch, security

Since this applies to sid (and oldstable) too, those tags are
just wrong.

So we have those versions:
openssl:
   Oldstable            0.9.7e-3sarge4
   Stable               0.9.8c-4
   Testing              0.9.8e-6
   Unstable             0.9.8e-8

openssl097:
   Stable               0.9.7k-3.1
   Testing              0.9.7k-3.1

openssl096
   Oldstable            0.9.6m-1sarge4

All those versions are probably vulnerable.

I'm not sure if the security team wants to have a DSA covering
oldstable's versions.

> According to http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5135
> (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135 is not
> yet available):

The patch for it seems to be at:
http://cvs.openssl.org/chngview?cn=16587

I've also attached it.



Kurt

> Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL
> 0.9.7l and 0.9.8d might allow remote attackers to execute arbitrary
> code via a crafted packet that triggers a one-byte buffer underflow.
> 
> According to the German IT news magazin "Heise Online", 0.9.7m and
> 0.9.8e are also affected:
> http://www.heise.de/security/news/meldung/96710
> 
> Original source seems to be this Bugtraq posting:
> http://www.securityfocus.com/archive/1/archive/1/480855/100/0/threaded
> 
> According to this posting, all lower versions are affected, too.
> 
> The release dates of 0.9.8e and 0.9.7m and the time line in the above
> mentioned Bugtraq posting suggest that not only 0.9.7l and 0.9.8d but
> also 0.9.7m and 0.9.8e are affected -- as Heise wrote.

Index: ssl_lib.c
===================================================================
RCS file: /home/kurt/openssl/cvs/openssl-cvs/openssl/ssl/ssl_lib.c,v
retrieving revision 1.133.2.9
retrieving revision 1.133.2.10
diff -u -r1.133.2.9 -r1.133.2.10
--- ssl_lib.c	12 Aug 2007 18:59:02 -0000	1.133.2.9
+++ ssl_lib.c	19 Sep 2007 12:16:21 -0000	1.133.2.10
@@ -1210,7 +1210,6 @@
 char *SSL_get_shared_ciphers(const SSL *s,char *buf,int len)
 	{
 	char *p;
-	const char *cp;
 	STACK_OF(SSL_CIPHER) *sk;
 	SSL_CIPHER *c;
 	int i;
@@ -1223,20 +1222,21 @@
 	sk=s->session->ciphers;
 	for (i=0; i<sk_SSL_CIPHER_num(sk); i++)
 		{
-		/* Decrement for either the ':' or a '\0' */
-		len--;
+		int n;
+
 		c=sk_SSL_CIPHER_value(sk,i);
-		for (cp=c->name; *cp; )
+		n=strlen(c->name);
+		if (n+1 > len)
 			{
-			if (len-- <= 0)
-				{
-				*p='\0';
-				return(buf);
-				}
-			else
-				*(p++)= *(cp++);
+			if (p != buf)
+				--p;
+			*p='\0';
+			return buf;
 			}
+		strcpy(p,c->name);
+		p+=n;
 		*(p++)=':';
+		len-=n+1;
 		}
 	p[-1]='\0';
 	return(buf);

Reply via email to