Bug 833754 (CVE-2013-3587) - VUL-0: CVE-2013-3587: various: BREACH attack allows attackers to sniff SSL encrypted HTTP traffic
Summary: VUL-0: CVE-2013-3587: various: BREACH attack allows attackers to sniff SSL en...
Status: RESOLVED FIXED
Alias: CVE-2013-3587
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on: CVE-2014-9720
Blocks:
  Show dependency treegraph
 
Reported: 2013-08-07 12:28 UTC by Matthias Weckbecker
Modified: 2015-05-11 08:29 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Matthias Weckbecker 2013-08-07 12:28:12 UTC
Similar to CRIME. More info available at:

https://threatpost.com/breach-compression-attack-steals-https-secrets-in-under-30-seconds/101579
Comment 1 Matthias Weckbecker 2013-08-07 12:32:18 UTC
Note:

I'm not sure whether this is an issue with SSL actually. I think this can only
occur with compression layers in between (such as mod_deflate). I also talked
with darix about it and he confirmed that disabling this is a valid workaround.

Any other opinions?
Comment 2 Marcus Rückert 2013-08-07 12:45:09 UTC
This is not only about disabling compression at the web server level you also need to filter the fields from the Accept-* header to avoid e.g. php using output compression.
Comment 3 Swamp Workflow Management 2013-08-07 22:00:24 UTC
bugbot adjusting priority
Comment 4 Shawn Chang 2013-08-09 10:48:00 UTC
I haven't seen any update from openssl community. I'll keep eyes on this issue.
Comment 5 Shawn Chang 2013-08-20 09:29:37 UTC
(In reply to comment #1)
> Note:
> 
> I'm not sure whether this is an issue with SSL actually. I think this can only
> occur with compression layers in between (such as mod_deflate). I also talked
> with darix about it and he confirmed that disabling this is a valid workaround.
> 
> Any other opinions?
>
Openssl won't fix this issue on SSL level. Django gave some possible mitigation solutions:
https://www.djangoproject.com/weblog/2013/aug/06/breach-and-django/

Should I close this bug as "won't fix"?
Comment 6 Shawn Chang 2013-09-28 01:22:54 UTC
according to oss-sec:
http://www.openwall.com/lists/oss-security/2013/09/24/1

It should not be fixed in openssl. So I'm closing this bug as "won't fix".
Comment 7 Marcus Meissner 2013-10-09 15:07:05 UTC
CVE-2013-3587 referenced by Redhat
Comment 8 Marcus Meissner 2013-10-09 15:08:38 UTC
- put out docu guidance not to use compression in webservers?
Comment 9 Matthias Weckbecker 2013-10-10 09:12:20 UTC
(In reply to comment #8)
> - put out docu guidance not to use compression in webservers?

Yes, sounds reasonable.
Comment 10 Marcus Meissner 2014-09-04 10:58:05 UTC
disabled compression in the meantime, not much more we can do