|
Message-ID: <CAFitrpTXqUibz--1qi+2O1PYKngnRVN-tw7ucSqNSAS8_J9k2g@mail.gmail.com> Date: Tue, 23 Apr 2019 11:40:05 +0100 From: Robbie Gemmell <robbie@...che.org> To: oss-security@...ts.openwall.com Subject: [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability Severity: Important Vendor: The Apache Software Foundation Versions Affected: Qpid Proton 0.9 - 0.27.0. Description: The TLS support in Apache Qpid Proton 0.9 - 0.27.0 can under some circumstances connect as a client to a TLS server that offers anonymous ciphers irrespective of whether the client was configured to verify the server's certificate or certificate against the hostname used to connect. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic. Versions 0.9 - 0.27.0 are affected when using OpenSSL prior to 1.1.0. This includes the Qpid Proton C library, and all language binding libraries using it. Installations using the native Windows Schannel TLS implementation or using OpenSSL 1.1.0 or later are not affected. Note that this attack will not work if client certificate authentication is in use as anonymous ciphers cannot be used in this case. Resolution: Anyone using an affected version with OpenSSL prior to 1.1.0 should upgrade their installation to 0.27.1 or higher for fix to this vulnerability. Credit: This issue was identified by the Qpid developers. References: [1] https://issues.apache.org/jira/browse/PROTON-2014 [2] https://qpid.apache.org/cves/CVE-2019-0223.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.