SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Tarantella Vendors:   Tarantella, Inc.
(Tarantella Issues Fix) OpenSSL ASN.1 Parsing Flaws Lets Remote User Crash Applications or Execute Arbitrary Code
SecurityTracker Alert ID:  1008418
SecurityTracker URL:  http://securitytracker.com/id/1008418
CVE Reference:   CVE-2003-0543, CVE-2003-0544, CVE-2003-0545   (Links to External Site)
Date:  Dec 9 2003
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.0, prior to 3.40.911
Description:   Several vulnerabilities were reported in the ASN.1 parsing code in OpenSSL. A remote user may be able to cause arbitrary code to be executed on a server application that uses OpenSSL. Tarantella Enterprise is affected.

It is reported that a remote user can send a specially crafted SSL client certificate containing invalid ASN.1 tag values to trigger a flaw in OpenSSL and cause OpenSSL to crash due to "out of bounds reads" (CVE: CVE-2003-0543 and CVE-2003-0544). These flaws affected 0.9.6 and 0.9.7. The specific impact depends on the application using OpenSSL. The report indicates that the effects against Apache (when using OpenSSL) are "limited" and only cause Apache httpd child processes to crash.

It is also reported that certain ASN.1 encodings detected to be invalid may trigger a double free of the ASN1_TYPE variable, deallocating memory that has already been deallocated (CVE: CVE-2003-0545). This flaw only affects 0.9.7. A remote user may be able to send a specially crafted SSL client certificate to an application that uses OpenSSL to potentially execute arbitrary code. The exact impact depends on how the application uses OpenSSL.

It is also reported that a remote user can specify an invalid public key in a certificate to cause the verify code to crash if the target server is configured to ignore public key decoding errors. The vendor notes that ignoring public key decoding errors is usually only done in debugging situations and not usually in production code. [Editor's note: A CVE number had not yet been assigned to this issue at the time of this entry.]

NISCC is credited with discovering these vulnerabilities.

The vendor reports a fourth related security issue, where an error in the SSL/TLS protocol handling will cause a server to parse a client certificate even when a client certificate is not specifically requested. As a result, any server application that uses OpenSSL can be attacked using the vulnerabilities described above, even if the server application does not enable client authentication.

Impact:   A remote user can cause an OpenSSL-based server process to crash.

A remote user can cause arbitrary code to be executed by an OpenSSL-based server process.

In both cases, the specific impact depends on how OpenSSL is used by the server process.

Solution:   Tarentella has released a fixed version (3.40.911) of the Tarantella Security Pack software. The security bulletin is available at:

http://www.tarantella.com/security/bulletin-08.html

Vendor URL:  www.tarantella.com/security/bulletin-08.html (Links to External Site)
Cause:   Boundary error, Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Solaris - SunOS)

Message History:   This archive entry is a follow-up to the message listed below.
Sep 30 2003 OpenSSL ASN.1 Parsing Flaws Lets Remote User Crash Applications or Execute Arbitrary Code



 Source Message Contents

Subject:  http://www.tarantella.com/security/bulletin-08.html


http://www.tarantella.com/security/bulletin-08.html

Tarantella updated their Security Bulletin #08 regarding ASN.1 parsing vulnerabilities 
described in CERT advisory CA-2003-26.

Tarantella Enterprise 3 versions 3.3x, 3.2x, 3.1x, and 3.0x are affected.

The vendor has released a fixed version (3.40.911) of the Tarantella Security Pack software.

The update to the bulletin is dated November 5, 2003 but appears to have been posted to 
the web site on December 8, 2003.

 > Originally posted: September 30, 2003
 > Last updated: Nov 5, 2003

 > Internal reference: FZ605046


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC