Bug 921312 (CVE-2015-2318) - VUL-0: CVE-2015-2318, CVE-2015-2319, CVE-2015-2320: mono, mono-core: multiple TLS vulnerabilities (TLS impersonation, SSLv2 support, FREAK)
Summary: VUL-0: CVE-2015-2318, CVE-2015-2319, CVE-2015-2320: mono, mono-core: multiple...
Status: RESOLVED FIXED
Alias: CVE-2015-2318
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other All
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2015-03-31
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: maint:released:sle11-sp1:61191 maint:...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-03-09 12:41 UTC by Andreas Stieger
Modified: 2018-12-12 07:44 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-03-09 12:41:37 UTC
Via oss-sec http://seclists.org/oss-sec/2015/q1/772

> A TLS impersonation attack was discovered in Mono's TLS stack by
> researchers at Inria. During checks on our TLS stack, we have
> discovered two further issues which we have fixed - SSLv2 support, and
> vulnerability to FREAK. These vulnerabilities affect basically every
> Mono version ever released.

> All three issues should be addressed in the following patches:
> 
> https://github.com/mono/mono/commit/1509226c41d74194c146deb173e752b8d3cdeec4
> https://github.com/mono/mono/commit/9c38772f094168d8bfd5bc73bf8925cd04faad10
> https://github.com/mono/mono/commit/b371da6b2d68b4cdd0f21d6342af6c42794f998b
> 
> These patches should apply to all Mono versions from 3.4.0 or so
> onwards. The EXPORT cipher removal patch requires slight modification
> in order to apply to Mono releases prior to 3.x -
> https://gist.github.com/directhex/728af6f96d1b8c976659 should work for
> these users. The Impersonation patch requires slight modification to
> apply to Mono releases prior to 3.4 -
> https://gist.github.com/directhex/f8c6e67f551d8a608154 should work for
> these users.
> 
> Alternatively, this is fixed in Mono 3.12.1 and higher:
> http://download.mono-project.com/sources/mono/mono-3.12.1.tar.bz2
> 
> Linux and Mac downloads from www.mono-project.com have been updated to
> 3.12.1 - the Windows release will take another day or two.
> 
> Below is a (non-exhaustive) list of Mono versions in use in supported
> distributions, and the patches they require for full coverage.
> 
> 2.4 branch (Ubuntu 10.04) - SSLv2 patch, Modified Impersonation patch,
> Modified FREAK patch
> 2.6.7 (Debian 6, SLES 11) - SSLv2 patch, Modified Impersonation patch,
> Modified FREAK patch
> 2.10.8 (Fedora 19, 20, 21) - SSLv2 patch, Modified Impersonation
> patch, Modified FREAK patch
> 2.10.8.1 (Debian 7, Ubuntu 12.04) - SSLv2 patch, Modified
> Impersonation patch, Modified FREAK patch
> 3.0.3 (openSUSE 12.3) - SSLv2 patch, Modified Impersonation patch,
> FREAK patch
> 3.0.6 (openSUSE 13.1) - SSLv2 patch, Modified Impersonation patch,
> FREAK patch
> 3.2.8 (Debian 8, Ubuntu 12.10, 14.10, 15.04, Gentoo) - SSLv2 patch,
> Modified Impersonation patch, FREAK patch
> 3.10.0 (Arch) - SSLv2 patch, Impersonation patch, FREAK patch
Comment 1 Swamp Workflow Management 2015-03-09 23:00:23 UTC
bugbot adjusting priority
Comment 2 Matthias Mailänder 2015-03-10 17:30:33 UTC
Filed https://build.opensuse.org/request/show/290204
Comment 3 Scott Reeves 2015-03-16 17:43:05 UTC
Mike - can you look into this...
Comment 5 Swamp Workflow Management 2015-03-17 05:59:52 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2015-03-31.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/61127
Comment 7 Andreas Stieger 2015-03-17 17:33:51 UTC
CVEs assigned in http://seclists.org/oss-sec/2015/q1/869:

https://github.com/mono/mono/commit/1509226c41d74194c146deb173e752b8d3cdeec4

The commit message says "TLS protocol: add handshake state validation"
but this is also referenced as "The Impersonation patch" and "A TLS
impersonation attack was discovered in Mono's TLS stack by researchers
at Inria." Although there isn't a description of what impersonation
vulnerability existed, almost certainly it is "SKIP-TLS ... Mono:
default TLS library vulnerable to client impersonation. Version 3.12.1
prevents the attack" as listed on the https://www.smacktls.com web
site.

Use CVE-2015-2318 for the https://www.smacktls.com SKIP-TLS issue in
Mono.

https://github.com/mono/mono/commit/9c38772f094168d8bfd5bc73bf8925cd04faad10

The commit message says "Remove the EXPORT ciphers and related code
path" - this directly matches "The EXPORT cipher removal patch" but it
is apparently also referenced as "FREAK patch" and "vulnerability to
FREAK." (It is conceivable that
1509226c41d74194c146deb173e752b8d3cdeec4 would also be applicable to
FREAK attacks.)

Use CVE-2015-2319 for the https://www.smacktls.com FREAK issue in
Mono.


https://github.com/mono/mono/commit/b371da6b2d68b4cdd0f21d6342af6c42794f998b

The commit message says "Remove the client-side SSLv2 fallback," which
apparently matches both "SSLv2 support" and "SSLv2 patch." MITRE does
currently accept reports from authors of SSL/TLS code who want to
characterize their own SSLv2 support, after a recent drop of support,
as a vulnerability (i.e., "These vulnerabilities affect ..." in
http://www.openwall.com/lists/oss-security/2015/03/07/2 together with
https://uk.linkedin.com/in/directhex).

Use CVE-2015-2320 for b371da6b2d68b4cdd0f21d6342af6c42794f998b.
Comment 15 Swamp Workflow Management 2015-05-08 16:05:06 UTC
SUSE-SU-2015:0841-1: An update that contains security fixes can now be installed.

Category: security (moderate)
Bug References: 921312
CVE References: 
Sources used:
SUSE Linux Enterprise Software Development Kit 11 SP3 (src):    mono-core-2.6.7-0.13.1
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    mono-core-2.6.7-0.13.1
SUSE Linux Enterprise Server 11 SP3 (src):    mono-core-2.6.7-0.13.1
SUSE Linux Enterprise Desktop 11 SP3 (src):    mono-core-2.6.7-0.13.1
Comment 16 Marcus Meissner 2015-11-04 16:18:41 UTC
released apparently.