Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-3716: security - Re: STARTTLS vulnerabilities

A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.

CVE
#vulnerability#web#mac#windows#linux#red_hat#git

Openwall

  • Products
    • Openwall GNU/*/Linux server OS
    • Linux Kernel Runtime Guard
    • John the Ripper password cracker
      • Free & Open Source for any platform
      • in the cloud
      • Pro for Linux
      • Pro for macOS
    • Wordlists for password cracking
    • passwdqc policy enforcement
      • Free & Open Source for Unix
      • Pro for Windows (Active Directory)
    • yescrypt KDF & password hashing
    • yespower Proof-of-Work (PoW)
    • crypt_blowfish password hashing
    • phpass ditto in PHP
    • tcb better password shadowing
    • Pluggable Authentication Modules
    • scanlogd port scan detector
    • popa3d tiny POP3 daemon
    • blists web interface to mailing lists
    • msulogin single user mode login
    • php_mt_seed mt_rand() cracker
  • Services
  • Publications
    • Articles
    • Presentations
  • Resources
    • Mailing lists
    • Community wiki
    • Source code repositories (GitHub)
    • Source code repositories (CVSweb)
    • File archive & mirrors
    • How to verify digital signatures
    • OVE IDs
  • What’s new

[<prev] [next>] [<thread-prev] [day] [month] [year] [list]

Date: Wed, 18 Aug 2021 10:26:12 -0500 From: Eric Blake <eblake@…hat.com> To: oss-security@…ts.openwall.com Subject: Re: STARTTLS vulnerabilities

On Mon, Aug 16, 2021 at 02:04:06PM -0500, Eric Blake wrote:

On Wed, Aug 11, 2021 at 06:02:35PM +0200, Hanno Böck wrote:

On Wed, 11 Aug 2021 10:31:58 -0500 Eric Blake <eblake@…hat.com> wrote:

Not mentioned in that list was ndb, but as far as I can tell, that project has already documented the ramifications of opportunistic encryption as being a security risk, and all known implementations (both servers and clients) with TLS support have a mode of execution that ensures the connection is dropped if a downgrade attack is attempted:

I should point out that our research is not on simple downgrade attacks. These are kinda obvious by the design of STARTTLS if you implement it in an opportunistic way.

The buffering vulnerabilities we found are in STARTTLS implementations that have the expectation to enforce a secure connection, but suffer from various vulnerabilities in the implementation.

Thank you for persisting. As a result, I have found a security bug in nbdkit, which improperly cached the result of NBD_OPT_STRUCTURED_REPLY from a plaintext MitM attacker prior to acting on NBD_OPT_STARTTLS, to the potential confusion of a client that does not expect structured replies. I will follow up again when I have a CVE number.

https://listman.redhat.com/archives/libguestfs/2021-August/msg00077.html

Now designated as CVE-2021-3716, affecting nbdkit versions 1.12 through 1.26.4; fixed nbdkit 1.26.5 will be released later today.

Mitigating factors: the bug is only possible when nbdkit is used in opportunistic mode (–tls=on); you can avoid it by requesting that nbdkit use forced tls mode (–tls=require on the command line). Furthermore, all impacted nbdkit versions give successful replies to repeated NBD_OPT_STRUCTURED_REPLY requests even though the NBD protocol did not mandate that, so any client that requests structured replies after STARTTLS will not see any change in behavior in spite of the MitM injection. In short, the bug will only impact really old clients that understand TLS but not structured replies (at this point, I’m aware of qemu 2.6 through 2.10, where most distros have moved to newer versions of qemu; and all versions of nbd-client 3.15 to the present).

– Eric Blake, Principal Software Engineer Red Hat, Inc. +1-919-301-3266 Virtualization: qemu.org | libvirt.org

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.

Powered by Openwall GNU/*/Linux Powered by OpenVZ

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907