From owner-svn-ports-head@FreeBSD.ORG Tue Aug 13 06:17:33 2013 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id A78973A3; Tue, 13 Aug 2013 06:17:33 +0000 (UTC) (envelope-from mandree@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 7A4AE2BB8; Tue, 13 Aug 2013 06:17:33 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id r7D6HXtf053868; Tue, 13 Aug 2013 06:17:33 GMT (envelope-from mandree@svn.freebsd.org) Received: (from mandree@localhost) by svn.freebsd.org (8.14.7/8.14.5/Submit) id r7D6HX8o053867; Tue, 13 Aug 2013 06:17:33 GMT (envelope-from mandree@svn.freebsd.org) Message-Id: <201308130617.r7D6HX8o053867@svn.freebsd.org> From: Matthias Andree Date: Tue, 13 Aug 2013 06:17:33 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r324651 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Aug 2013 06:17:33 -0000 Author: mandree Date: Tue Aug 13 06:17:32 2013 New Revision: 324651 URL: http://svnweb.freebsd.org/changeset/ports/324651 Log: Record PolarSSL < 1.2.8 infinite loop denial of service. Note: the port has not yet been upgraded, and the fix then needs to be merged to the 9.2 ports branch before release. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Aug 13 05:16:55 2013 (r324650) +++ head/security/vuxml/vuln.xml Tue Aug 13 06:17:32 2013 (r324651) @@ -51,6 +51,35 @@ Note: Please add new entries to the beg --> + + polarssl -- denial of service through unterminated loop in certificate parser + + + polarssl + 1.2.8 + + + + +

Paul Bakker reports:

+
+

A bug in the logic of the parsing of PEM encoded certificates in x509parse_crt() can result in an infinite loop, thus hogging processing power. +

+ While parsing a Certificate message during the SSL/TLS handshake, PolarSSL extracts the presented certificates and sends them on to be parsed. As the RFC specifies that the certificates in the Certificate message are always X.509 certificates in DER format, bugs in the decoding of PEM certificates should normally not be triggerable via the SSL/TLS handshake. +

+ Versions of PolarSSL prior to 1.1.7 in the 1.1 branch and prior to 1.2.8 in the 1.2 branch call the generic x509parse_crt() function for parsing during the handshake. x509parse_crt() is a generic functions that wraps parsing of both PEM-encoded and DER-formatted certificates. As a result it is possible to craft a Certificate message that includes a PEM encoded certificate in the Certificate message that triggers the infinite loop.

+
+ +
+ + https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-03 + + + 2013-06-21 + 2013-08-13 + +
+ samba -- denial of service vulnerability