[Bug 1714640] Re: CVE-2017-14032 - certificate authentication bypass

Simon Quigley tsimonq2 at ubuntu.com
Thu Sep 7 02:15:09 UTC 2017


Sponsoring to Artful (patch lgtm, thank you!) and unsubscribing ~ubuntu-
sponsors. ~ubuntu-security-sponsors can take it from here.

Thank you for your contribution to Ubuntu!

** Also affects: mbedtls (Ubuntu Zesty)
   Importance: Undecided
       Status: New

** Also affects: mbedtls (Ubuntu Artful)
   Importance: Undecided
       Status: Confirmed

** Also affects: mbedtls (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Changed in: mbedtls (Ubuntu Artful)
       Status: Confirmed => Fix Committed

** Changed in: mbedtls (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: mbedtls (Ubuntu Zesty)
   Importance: Undecided => Medium

** Changed in: mbedtls (Ubuntu Artful)
   Importance: Undecided => Medium

** Changed in: mbedtls (Ubuntu Xenial)
     Assignee: (unassigned) => James Cowgill (jcowgill)

** Changed in: mbedtls (Ubuntu Zesty)
     Assignee: (unassigned) => James Cowgill (jcowgill)

** Changed in: mbedtls (Ubuntu Artful)
     Assignee: (unassigned) => James Cowgill (jcowgill)

** Changed in: mbedtls (Ubuntu Xenial)
       Status: New => Confirmed

** Changed in: mbedtls (Ubuntu Zesty)
       Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Sponsors Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1714640

Title:
  CVE-2017-14032 - certificate authentication bypass

Status in mbedtls package in Ubuntu:
  Fix Committed
Status in mbedtls source package in Xenial:
  Confirmed
Status in mbedtls source package in Zesty:
  Confirmed
Status in mbedtls source package in Artful:
  Fix Committed
Status in mbedtls package in Debian:
  Fix Released

Bug description:
  The following security bug was published for mbedtls:

  [Vulnerability]
  If a malicious peer supplies an X.509 certificate chain that has more
  than MBEDTLS_X509_MAX_INTERMEDIATE_CA intermediates (which by default is
  8), it could bypass authentication of the certificates, when the
  authentication mode was set to 'optional' eg.
  MBEDTLS_SSL_VERIFY_OPTIONAL. The issue could be triggered remotely by
  both the client and server sides.

  If the authentication mode, which can be set by the function
  mbedtls_ssl_conf_authmode(), was set to 'required' eg.
  MBEDTLS_SSL_VERIFY_REQUIRED which is the default, authentication would
  occur normally as intended.

  [Impact]
  Depending on the platform, an attack exploiting this vulnerability could
  allow successful impersonation of the intended peer and permit
  man-in-the-middle attacks.

  https://tls.mbed.org/tech-updates/security-advisories/mbedtls-
  security-advisory-2017-02

  As far as I can tell, mbed TLS in xenial, zesty and artful are
  affected. No version of polarssl is affected.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mbedtls/+bug/1714640/+subscriptions



More information about the Ubuntu-sponsors mailing list