Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <548694FC.9070209@redhat.com>
Date: Tue, 09 Dec 2014 11:51:48 +0530
From: Huzaifa Sidhpurwala <huzaifas@...hat.com>
To: oss-security@...ts.openwall.com,
        Mitre CVE assign department <cve-assign@...re.org>
Subject: CVE question: Return of POODLE

Hi All,

Before i ask my question:

It seems some TLS implementations may be vulnerable to POODLE like 
attack if they use SSL 3.0 type padding and the padding bytes are not 
checked by the implementation.

https://www.imperialviolet.org/2014/12/08/poodleagain.html
https://devcentral.f5.com/articles/cve-2014-8730-padding-issue-8151


CVE-2014-8730 was assigned to this issue (by MITRE i suppose) and its 
not clear if this CVE has been assigned to their code or to the protocol 
weakness.

I have not checked if any implementations are vulnerable, but could 
MITRE please confirm if its ok to reuse this CVE if any crypto-libs are 
found vulnerable, or if they plan to assign another CVE id?


-- 
Huzaifa Sidhpurwala / Red Hat Product Security Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.