Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAFitrpTXqUibz--1qi+2O1PYKngnRVN-tw7ucSqNSAS8_J9k2g@mail.gmail.com>
Date: Tue, 23 Apr 2019 11:40:05 +0100
From: Robbie Gemmell <robbie@...che.org>
To: oss-security@...ts.openwall.com
Subject: [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability

CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Qpid Proton 0.9 - 0.27.0.

Description:
The TLS support in Apache Qpid Proton 0.9 - 0.27.0 can under some
circumstances connect as a client to a TLS server that offers anonymous
ciphers irrespective of whether the client was configured to verify the
server's certificate or certificate against the hostname used to connect.

This means that an undetected man in the middle attack could be
constructed if an attacker can arrange to intercept TLS traffic.

Versions 0.9 - 0.27.0 are affected when using OpenSSL prior to 1.1.0. This
includes the Qpid Proton C library, and all language binding libraries using
it. Installations using the native Windows Schannel TLS implementation or
using OpenSSL 1.1.0 or later are not affected.

Note that this attack will not work if client certificate authentication is
in use as anonymous ciphers cannot be used in this case.

Resolution:
Anyone using an affected version with OpenSSL prior to 1.1.0 should upgrade
their installation to 0.27.1 or higher for fix to this vulnerability.

Credit:
This issue was identified by the Qpid developers.

References:
[1] https://issues.apache.org/jira/browse/PROTON-2014
[2] https://qpid.apache.org/cves/CVE-2019-0223.html

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.