Australia's Leading Computer Emergency Response Team

ESB-2006.0897 -- [Solaris] -- Security Vulnerability With RSA Signatures Affects OpenSSL Shipped With Solaris
Date: 14 November 2007
Original URL: http://www.auscert.org.au/render.html?cid=1980&it=7060
References: AL-2006.0074  

Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                        ESB-2006.0897 -- [Solaris]
        Security Vulnerability With RSA Signatures Affects OpenSSL
                           Shipped With Solaris
                             15 November 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              OpenSSL
Publisher:            Sun Microsystems
Operating System:     Solaris 9
                      Solaris 10
Impact:               Reduced Security
Access:               Remote/Unauthenticated
CVE Names:            CVE-2006-4339

Ref:                  AL-2006.0074

Original Bulletin:    
  http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-102744-1

Revision History:     November 15 2007: Updated the Contributing Factors to 
                                        provide commands that test if a 
                                        system is vulnerable.
                      November 14 2007: Updated the product field to include 
                                        Solaris 9. 
                                        Updated the Contributing Factors to 
                                        include all vulnerable applications 
                                        and releases. 
                                        Updated the Resolution to list the 
                                        releases that fix this 
                                        vulnerability.
                      December 11 2006: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------


Sun(sm) Alert Notification
     * Sun Alert ID: 102744
     * Synopsis: Security Vulnerability With RSA Signatures Affects
       OpenSSL Shipped With Solaris
     * Category: Security
     * Product: Solaris 9 Operating System, Solaris 10 Operating System
     * BugIDs: 6467218
     * Avoidance: Patch, Workaround
     * State: Resolved
     * Date Released: 08-Dec-2006, 08-Nov-2007
     * Date Closed: 08-Nov-2007
     * Date Modified: 08-Nov-2007, 13-Nov-2007

1. Impact

   A security vulnerability in the RSA signature verification
   implementation in the OpenSSL product may incorrectly verify data
   signed with a forged signature. This will affect applications which
   make use of OpenSSL to verify RSA signatures. The direct impact to
   these applications will depend on the way in which this signed data is
   used.

   OpenSSL is shipped with Solaris 10 (see openssl(5)). This library is
   not shipped with Solaris 9, however, a number of Solaris 9
   applications statically link against this library and may be affected
   by these vulnerabilities. This Sun Alert provides details about the
   individual patches which should be installed to update the OpenSSL
   product on Solaris 10 and all potentially impacted Solaris 9
   applications.

   This issue is also described in the following documents:
     * CERT VU#845620 at: http://www.kb.cert.org/vuls/id/845620
     * CVE-2006-4339 at:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339

   Note: The issue described in this Sun Alert is specific to the OpenSSL
   shipped with Solaris. Multiple Sun products are affected by this
   issue. For more details please see Sun Alert 102648.

2. Contributing Factors

   These issues can occur with the OpenSSL included in the following
   applications and releases:

   SPARC Platform
     * Solaris 9 SSH without patches 113273-14 and 114356-11
     * Solaris 9 Packaging utilities without patch 113713-24
     * Solaris 10 without patch 121229-02

   x86 Platform
     * Solaris 9 SSH without patches 114357-10 and 114858-11
     * Solaris 9 Packaging utilities without patch 114568-23
     * Solaris 10 without patch 121230-02

   Note 1: Solaris 8 is not impacted by this issue.

   Note 2: Solaris 9 does not ship with OpenSSL libraries which can be
   used for application linking.

   Note 3: The Solaris 9 SSH patches listed above update the OpenSSL
   library used by SSH to a version that is not impacted by this issue.
   However, this fix is not required for Solaris 9 systems which have the
   following patches installed, as the SSH that is contained in those
   patches does not make use of the impacted code from the OpenSSL
   library:
     * Solaris 9 SPARC patches 112908-24, 113273-11,
       114356-07, 117177-02 (or later revisions of these patches)
     * Solaris 9 x86 patches 114263-05, 114357-07, 114858-09,
       115168-11, 117178-02 (or later revisions of these patches)

   Note 4: This issue is only exploitable in cases where keys with
   certain properties are used. Tools such as openssl(1) (which is
   shipped with Solaris 10, Solaris 9 does not include a tool which can
   be used for this purpose) can be used to get the needed properties:
    $ openssl x509 -pubkey -in server.crt -text

   If the output contains the following lines, then signatures of this
   key can be forged:
    Public Key Algorithm: rsaEncryption
    Exponent: 3 (0x3)

   For more information about displaying public keys and certificate
   signature verification, see the openssl(1) manual page on Solaris 10.

   As an example of an affected application, Solaris 10 is distributed
   with the Apache web server. This server can be configured to accept
   connections with the HTTPS protocol. Since Apache uses OpenSSL for
   cryptographic operations it may be impacted by this vulnerability
   under certain circumstances.

   To verify that a system running the Apache web server is configured to
   accept HTTPS connections a command such as the following can be used:
    $ svcprop -p httpd/ssl svc:network/http:apache2

   If the above command reports "true" then Apache is configured to
   accept HTTPS connections.

   The following command can be used to check whether a system that is
   configured to accept HTTPS connections uses certificates for client
   authentication:
    $ grep SSLVerifyClient /etc/apache2/ssl.conf

   If the output contains the following line, then the system is
   vulnerable:
    SSLVerifyClient require

   In such cases, an unprivileged remote user could gain access to
   restricted documents served by the Apache server. This depends on the
   type of certificates in use, as described above.

3. Symptoms

   There are no predictable symptoms that would indicate the described
   issue has been exploited to forge a signature for trusted application
   data. 

4. Relief/Workaround

   Until patches can be applied, sites may wish to disable the
   verification of RSA signatures or only enable the verification of RSA
   signatures created with RSA keys that have an exponent other than 3.

   Please see the application documentation for instructions on how to
   disable verification of certificates containing keys with the above
   mentioned properties.

5. Resolution

   These issues are addressed in the following releases:

   SPARC Platform
     * Solaris 9 SSH with patches 113273-14 and 114356-11 or
       later
     * Solaris 9 Packaging utilities with patch 113713-24 or later
     * Solaris 10 with patch 121229-02 or later

   x86 Platform
     * Solaris 9 SSH with patches 114357-10 and 114858-11 or
       later
     * Solaris 9 Packaging utilities with patch 114568-23 or later
     * Solaris 10 with patch 121230-02 or later

Change History

   08-Nov-2007:
     * State: Resolved
     * Updated the Product field
     * Updated Contributing Factors and Resolution sections

   13-Nov-2007:
     * Updated the Contributing Factors section

   This Sun Alert notification is being provided to you on an "AS IS"
   basis. This Sun Alert notification may contain information provided by
   third parties. The issues described in this Sun Alert notification may
   or may not impact your system(s). Sun makes no representations,
   warranties, or guarantees as to the information contained herein. ANY
   AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
   WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
   NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT
   YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
   INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE
   OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN.
   This Sun Alert notification contains Sun proprietary and confidential
   information. It is being provided to you pursuant to the provisions of
   your agreement to purchase services from Sun, or, if you do not have
   such an agreement, the Sun.com Terms of Use. This Sun Alert
   notification may only be used for the purposes contemplated by these
   agreements.

   Copyright 2000-2006 Sun Microsystems, Inc., 4150 Network Circle, Santa
   Clara, CA 95054 U.S.A. All rights reserved


- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRzuDfSh9+71yA2DNAQJb+wP/dc7l9D/FpZXD1ougQ9amj69P02aLax73
q90xxvB+GEcrDe6CS3S1rXIrqHk87ixXcdXMPbHW4meFuSQRCCAk7ghsPStKbKFd
vyCP0YqUm02Q6A0hx3Wsg59zs6g+nnbg+Vz0aTsKKJMIzBD694rei9J5CXnVgbAT
LSfQDlp8LCM=
=mM3c
-----END PGP SIGNATURE-----