Bug 938571 (CVE-2015-3278) - VUL-0: CVE-2015-3278: mozilla-nss: incorrect multi-keyword mode cipherstring parsing
Summary: VUL-0: CVE-2015-3278: mozilla-nss: incorrect multi-keyword mode cipherstring ...
Status: RESOLVED INVALID
Alias: CVE-2015-3278
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Petr Cerny
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/118780/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-07-17 12:24 UTC by Andreas Stieger
Modified: 2015-07-24 14:02 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-07-17 12:24:23 UTC
Via RH:

It was reported that cipherstring parsing code incorrectly implements the multi-keyword mode in nss_compat_ossl.

As a consequence anyone using a combination like

  ECDH+SHA

will not get the expected set of ciphers

  ECDH-RSA-RC4-SHA
  ECDH-RSA-DES-CBC3-SHA
  ECDH-RSA-AES128-SHA
  ECDH-RSA-AES256-SHA
  ECDH-ECDSA-RC4-SHA
  ECDH-ECDSA-DES-CBC3-SHA
  ECDH-ECDSA-AES128-SHA
  ECDH-ECDSA-AES256-SHA
  ECDHE-RSA-RC4-SHA
  ECDHE-RSA-DES-CBC3-SHA
  ECDHE-RSA-AES128-SHA
  ECDHE-RSA-AES256-SHA
  ECDHE-ECDSA-RC4-SHA
  ECDHE-ECDSA-DES-CBC3-SHA
  ECDHE-ECDSA-AES128-SHA
  ECDHE-ECDSA-AES256-SHA

but instead will match

  DES-CBC-SHA
  DES-CBC3-SHA
  RC4-SHA
  EDH-RSA-DES-CBC-SHA
  EDH-RSA-DES-CBC3-SHA
  EDH-DSS-DES-CBC-SHA
  EDH-DSS-DES-CBC3-SHA
  EXP1024-DES-CBC-SHA
  EXP1024-RC4-SHA
  SEED-SHA
  AES128-SHA
  AES256-SHA
  CAMELLIA256-SHA
  CAMELLIA128-SHA
  DHE-RSA-AES128-SHA
  DHE-RSA-AES256-SHA
  DHE-RSA-CAMELLIA128-SHA
  DHE-RSA-CAMELLIA256-SHA
  DHE-DSS-RC4-SHA
  DHE-DSS-AES128-SHA
  DHE-DSS-AES256-SHA
  DHE-DSS-CAMELLIA128-SHA
  DHE-DSS-CAMELLIA256-SHA
  ECDH-RSA-RC4-SHA
  ECDH-RSA-DES-CBC3-SHA
  ECDH-RSA-AES128-SHA
  ECDH-RSA-AES256-SHA
  ECDH-ECDSA-RC4-SHA
  ECDH-ECDSA-DES-CBC3-SHA
  ECDH-ECDSA-AES128-SHA
  ECDH-ECDSA-AES256-SHA
  ECDHE-RSA-RC4-SHA
  ECDHE-RSA-DES-CBC3-SHA
  ECDHE-RSA-AES128-SHA
  ECDHE-RSA-AES256-SHA
  ECDHE-ECDSA-RC4-SHA
  ECDHE-ECDSA-DES-CBC3-SHA
  ECDHE-ECDSA-AES128-SHA
  ECDHE-ECDSA-AES256-SHA

Acknowledgements:

Red Hat would like to thank Martin Poole of Software Maintenance Engineering group for reporting this issue.



References:
https://bugzilla.redhat.com/show_bug.cgi?id=1238326
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3278
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3278


No patch is publically available at this time
Comment 1 Swamp Workflow Management 2015-07-17 22:00:18 UTC
bugbot adjusting priority
Comment 2 Marcus Meissner 2015-07-18 10:27:28 UTC
I do not think we use the nss -> openssl converter.