Bug 862289 (CVE-2014-1491) - VUL-0: CVE-2014-1491: mozilla-nss: Do not allow p-1 as a public DH value
Summary: VUL-0: CVE-2014-1491: mozilla-nss: Do not allow p-1 as a public DH value
Status: RESOLVED DUPLICATE of bug 861847
Alias: CVE-2014-1491
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: E-mail List
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-02-05 08:43 UTC by Victor Pereira
Modified: 2016-04-27 18:59 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2014-02-05 08:43:16 UTC
CVE-2014-1491

1. Create a TLS server supporting only the DHE key exchange.
2. During any handshake, send the parameters <p, g, g^q> where p=2q+1 is a prime such that q is also prime and g is not a quadratic residue mod p
3. NSS accepts this value and proceeds with the handshake. The PMS computed by NSS is g^(q*Kc)


Actual results:

NSS accepts to proceed with the exchange. If g is not a quadratic residue mod p, then g^q = p-1 which is not rejected by NSS as it accepts any public value in [2, p-1] (this is allowed by rfc2631). Then, the computed PMS g^(q*Kc) is 1 if Kc is even (because g^(2q)=g^(p-1)=1 [mod p]) and p-1 if Kc is odd (because g^q=p-1 [mod p]). If the server chose a Ks with the same parity, the PMS will be the same on the client and server but the communication is not safe because an attacker can derive it from the parameters sent over the network.



References:

http://www.mozilla.org/security/announce/2014/mfsa2014-12.html
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1491
https://bugzilla.redhat.com/show_bug.cgi?id=1060955
Comment 1 Swamp Workflow Management 2014-02-05 23:04:36 UTC
bugbot adjusting priority
Comment 2 Victor Pereira 2014-02-19 10:41:05 UTC
duplicated

*** This bug has been marked as a duplicate of bug 861847 ***