TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OpenSSL 3.0.7 fixes X.509 email address buffer overflows

586 pointsby petecooperover 2 years ago

39 comments

formerly_provenover 2 years ago
The web pages and git aren&#x27;t updated yet, here is the vulnerability straight from the .tar.gz on their FTP:<p>Fixed two buffer overflows in punycode decoding functions. A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer.<p>In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.<p>An attacker can craft a malicious email address to overflow an arbitrary number of bytes containing the . character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). ([CVE-2022-3786])<p>An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution depending on stack layout for any given platform&#x2F;compiler. ([CVE-2022-3602])<p>-----------------------------------<p>Doesn&#x27;t sound <i>that</i> critical to me. CAs normally don&#x27;t let you outright construct your own certificate, and I&#x27;d expect you&#x27;ll have a hard time to get a certificate issued which is both for mail encryption (so you get an email name constraint) <i>and</i> TLS (SAN constraint). And servers without TLS client authentication, which is about 99.99 % of them, aren&#x27;t affected. TLS client auth is usually only used in enterprise networks and typically terminated by middleboxes running ancient software anyway.
评论 #33423899 未加载
评论 #33422928 未加载
评论 #33423670 未加载
评论 #33423077 未加载
评论 #33422966 未加载
ComputerGuruover 2 years ago
For anyone else with &quot;mature&quot; server configurations confused by the OpenSSL version number because you&#x27;re on 1.1.x and wondering how to translate the patched 3.0.x version number to something that applies to you; it seems that you have nothing to worry about:<p>&gt; This code was first introduced in OpenSSL 3.0.0. OpenSSL 1.0.2, 1.1.1 and other earlier versions are not affected.<p>&gt; We did release an update to OpenSSL 1.1.1, namely 1.1.1s, also on 1st November 2022, but this is a bug fix release only and does not include any security fixes.
评论 #33432908 未加载
评论 #33430826 未加载
Arcuruover 2 years ago
From their blog [1] the vulnerability &quot;was reported in private to OpenSSL on 17th October 2022 by Polar Bear who was performing an audit of OpenSSL code&quot;. OpenSSL 3.0 was released in September 2021.<p>Shouldn&#x27;t fuzzing have caught this at some point? I was under the impression that OpenSSL was being fuzz tested constantly since Heartbleed.<p>[1] <a href="https:&#x2F;&#x2F;www.openssl.org&#x2F;blog&#x2F;blog&#x2F;2022&#x2F;11&#x2F;01&#x2F;email-address-overflows&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.openssl.org&#x2F;blog&#x2F;blog&#x2F;2022&#x2F;11&#x2F;01&#x2F;email-address-o...</a>
评论 #33425925 未加载
评论 #33425206 未加载
评论 #33425187 未加载
评论 #33425973 未加载
SoftTalkerover 2 years ago
I noticed that LibreSSL posted a patch release (3.6.1) does anyone know if this addresses similar issues?<p><pre><code> We have released LibreSSL 3.6.1, which will be arriving in the LibreSSL directory of your local OpenBSD mirror soon. It includes the following fixes: - Custom verification callbacks could cause the X.509 verifier to fail to store errors resulting from leaf certificate verification. Reported by Ilya Shipitsin. - Unbreak ASN.1 indefinite length encoding. Reported by Niklas Hallqvist. - Fix endian detection on macOS Reported by jiegec on Github</code></pre>
评论 #33427139 未加载
评论 #33423751 未加载
baggy_troughover 2 years ago
OpenSSL blog post: <a href="https:&#x2F;&#x2F;www.openssl.org&#x2F;blog&#x2F;blog&#x2F;2022&#x2F;11&#x2F;01&#x2F;email-address-overflows&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.openssl.org&#x2F;blog&#x2F;blog&#x2F;2022&#x2F;11&#x2F;01&#x2F;email-address-o...</a><p>Q: Are all applications using OpenSSL 3.0 vulnerable by default?<p>A: Any OpenSSL 3.0 application that verifies X.509 certificates received from untrusted sources should be considered vulnerable. This includes TLS clients, and TLS servers that are configured to use TLS client authentication.<p>Q: Are there any mitigations until I can upgrade?<p>A: Users operating TLS servers may consider disabling TLS client authentication, if it is being used, until fixes are applied.
评论 #33423789 未加载
seedless-sensatover 2 years ago
I liked this write up: <a href="https:&#x2F;&#x2F;securitylabs.datadoghq.com&#x2F;articles&#x2F;openssl-november-1-vulnerabilities&#x2F;#exploitation-technical-details" rel="nofollow">https:&#x2F;&#x2F;securitylabs.datadoghq.com&#x2F;articles&#x2F;openssl-november...</a>
herpderperatorover 2 years ago
&gt; An off by one error in the punycode decoder allowed for a single unsigned int overwrite of a buffer which could cause a crash and possible code execution.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;openssl&#x2F;openssl&#x2F;commit&#x2F;3b421ebc64c7b52f1b9feb3812bdc7781c784332" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;openssl&#x2F;openssl&#x2F;commit&#x2F;3b421ebc64c7b52f1b...</a><p>A one character change.
psanfordover 2 years ago
Colm MacCárthaigh has a nice writeup on CVE−2022-3602 including steps to reproduce: <a href="https:&#x2F;&#x2F;github.com&#x2F;colmmacc&#x2F;CVE-2022-3602" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;colmmacc&#x2F;CVE-2022-3602</a>
gnfargblover 2 years ago
No RCE on Ubuntu:<p><pre><code> Ubuntu packages are built with stack protector, reducing the impact of this CVE from remote code execution to a denial of service. </code></pre> -- <a href="https:&#x2F;&#x2F;ubuntu.com&#x2F;security&#x2F;CVE-2022-3602" rel="nofollow">https:&#x2F;&#x2F;ubuntu.com&#x2F;security&#x2F;CVE-2022-3602</a>
评论 #33426733 未加载
评论 #33424319 未加载
评论 #33424818 未加载
nequoover 2 years ago
Ubuntu 22.04 ships with OpenSSL 3.0.2. Now that it&#x27;s November 1, I was expecting to see `openssl` in a `sudo apt upgrade` but it is not there.<p>Does anyone know when Ubuntu might ship the fix?
评论 #33423397 未加载
评论 #33423222 未加载
评论 #33423190 未加载
评论 #33426802 未加载
评论 #33424273 未加载
评论 #33424931 未加载
petecooperover 2 years ago
<a href="https:&#x2F;&#x2F;archive.ph&#x2F;Igu2e" rel="nofollow">https:&#x2F;&#x2F;archive.ph&#x2F;Igu2e</a>
l1nover 2 years ago
Sounds like this is mostly caught by stack overflow protections. From the release blog:<p>Firstly, we had reports that on certain Linux distributions the stack layout was such that the 4 bytes overwrote an adjacent buffer that was yet to be used and therefore there was no crash or ability to cause remote code execution.<p>Secondly, many modern platforms implement stack overflow protections which would mitigate against the risk of remote code execution and usually lead to a crash instead.<p>However as OpenSSL is distributed as source code we have no way of knowing how every platform and compiler combination has arranged the buffers on the stack and therefore remote code execution may still be possible on some platforms.
评论 #33423537 未加载
lawgimenezover 2 years ago
This might be relevant: <a href="https:&#x2F;&#x2F;www.malwaretech.com&#x2F;2022&#x2F;11&#x2F;everything-you-need-to-know-about-the-openssl-3-0-7-patch.html" rel="nofollow">https:&#x2F;&#x2F;www.malwaretech.com&#x2F;2022&#x2F;11&#x2F;everything-you-need-to-k...</a>
aborsyover 2 years ago
There are probably many such vulnerabilities in this giant code base, being exploited by those who have resources to find them.<p>If OpenSSL is written in Rust, to what extent will the vulnerabilities be reduced (assuming that Rust is supported by the host, of course)?
评论 #33428196 未加载
29athrowawayover 2 years ago
Breaking news: software written in a language with error prone memory management has another security incident related to memory management.<p>Stay tuned for the next buffer overflow, use after free, and another easily preventable problem. We will run out of CVE numbers soon thanks to OpenSSL.<p>If there only were well-known solutions to this problem. Like programming languages that restrict what you can do in terms of memory management... Like Rust.<p>But hey, don&#x27;t get distracted by automated memory management solutions, we are too busy fixing memory management problems manually.
评论 #33432011 未加载
评论 #33430978 未加载
grepLeighover 2 years ago
Hugops to anyone patching today. I&#x27;m currently rolling over-the-air updates to a fleet of hundreds of Raspberry Pis distributed around the world.
mrocheover 2 years ago
Red Hat vulnerability page with a system detection script:<p><a href="https:&#x2F;&#x2F;access.redhat.com&#x2F;security&#x2F;vulnerabilities&#x2F;RHSB-2022-004" rel="nofollow">https:&#x2F;&#x2F;access.redhat.com&#x2F;security&#x2F;vulnerabilities&#x2F;RHSB-2022...</a>
评论 #33423651 未加载
评论 #33425085 未加载
babyover 2 years ago
<a href="https:&#x2F;&#x2F;twitter.com&#x2F;cryptodavidw&#x2F;status&#x2F;1587505925731934208" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;cryptodavidw&#x2F;status&#x2F;1587505925731934208</a>&#x27;<p>&gt; Can you imagine that 10 years ago, a paper came out called &quot;The most dangerous code in the world: validating SSL certificates in non-browser software&quot;. And today we&#x27;re still getting X.509 critical vulnerabilities in OpenSSL (<a href="https:&#x2F;&#x2F;crypto.stanford.edu&#x2F;~dabo&#x2F;pubs&#x2F;abstracts&#x2F;ssl-client-bugs.html" rel="nofollow">https:&#x2F;&#x2F;crypto.stanford.edu&#x2F;~dabo&#x2F;pubs&#x2F;abstracts&#x2F;ssl-client-...</a>)
awinter-pyover 2 years ago
woof sympathy to everyone else who joined both the openssl exploit + the rust bound checking stan drinking game for november<p>rough afternoon ahead
secondcomingover 2 years ago
&gt; the bugs were introduced as part of punycode decoding functionality<p>Did they handroll their own decoder, or did they use the reference code [0] in the RFC?<p>[0] <a href="https:&#x2F;&#x2F;www.rfc-editor.org&#x2F;rfc&#x2F;rfc3492#page-23" rel="nofollow">https:&#x2F;&#x2F;www.rfc-editor.org&#x2F;rfc&#x2F;rfc3492#page-23</a>
m_eimanover 2 years ago
I suppose this is the &quot;clear your schedule and be prepared to patch the entire world&quot; version?
评论 #33423309 未加载
评论 #33424255 未加载
评论 #33423041 未加载
billpgover 2 years ago
Exactly how panicked should I be right now?
评论 #33428804 未加载
评论 #33426267 未加载
cp9over 2 years ago
woah at least a DOS with just a malicious email address and potentially an RCE. yiiiiiikes that&#x27;s bad
评论 #33423579 未加载
8K832d7tNmiQover 2 years ago
When will this package got updated on GCP? Currently on Ubuntu 22.04 and we&#x27;re still on 3.0.2 .
评论 #33423382 未加载
评论 #33424805 未加载
评论 #33423132 未加载
nurettinover 2 years ago
This vulnerability could actually be weponized against botnets that utilize older ssh clients.
评论 #33424697 未加载
entropicgravityover 2 years ago
Shouldn&#x27;t AI be able to track down these security problems in C and C++ code and patch them properly? It kind of seems like if current AI can&#x27;t solve these problems which are strictly programmatic then what else can we expect them to solve. Or is even this some kind of NP level problem?
macintuxover 2 years ago
Affected (and unaffected) software tracking page shared earlier today:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;NCSC-NL&#x2F;OpenSSL-2022&#x2F;blob&#x2F;main&#x2F;software&#x2F;README.md" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;NCSC-NL&#x2F;OpenSSL-2022&#x2F;blob&#x2F;main&#x2F;software&#x2F;R...</a>
评论 #33423711 未加载
dochtmanover 2 years ago
Reminder that rustls exists as a pretty mature TLS implementation in safe Rust (thus systematically avoiding issues like this). Thanks to Brian Smith for creating the webpki crate which was thoroughly engineered from the start to avoid stuff like this.<p>rustls has C bindings these days: <a href="https:&#x2F;&#x2F;github.com&#x2F;rustls&#x2F;rustls-ffi" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;rustls&#x2F;rustls-ffi</a><p>I&#x27;ve started work on Python bindings too, with the idea that it probably wouldn&#x27;t be crazy hard to do something that can pass as an `ssl.SSLSocket`. Please sponsor me on GitHub if that&#x27;s something you&#x27;d like to use (<a href="https:&#x2F;&#x2F;github.com&#x2F;sponsors&#x2F;djc" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;sponsors&#x2F;djc</a>).<p>Note, we&#x27;re aware that by far the biggest impediment to adopting rustls is the lack of support for IP addresses in certificates (we currently need a DNS name). This work is funded and should be completed in the next few months.
评论 #33423638 未加载
评论 #33423991 未加载
评论 #33423393 未加载
评论 #33423544 未加载
评论 #33423392 未加载
MallocVoidstarover 2 years ago
<p><pre><code> * Fixed two buffer overflows in punycode decoding functions. A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. An attacker can craft a malicious email address to overflow an arbitrary number of bytes containing the `.` character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). ([CVE-2022-3786]) An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution depending on stack layout for any given platform&#x2F;compiler. ([CVE-2022-3602])</code></pre>
评论 #33423018 未加载
tempayover 2 years ago
Apparently the &quot;Critical&quot; vulnerability has been downgraded to &quot;High&quot; since the annoucement: <a href="https:&#x2F;&#x2F;www.openssl.org&#x2F;news&#x2F;vulnerabilities.html" rel="nofollow">https:&#x2F;&#x2F;www.openssl.org&#x2F;news&#x2F;vulnerabilities.html</a>
评论 #33424121 未加载
评论 #33424812 未加载
hedoraover 2 years ago
So, back in early 2000&#x27;s, it was common knowledge that some US gov&#x27;t agency (NSA?) had managed to get a saboteur in to the SSL standardization committee.<p>Once they were outed, it was clear that all they did was push as much complexity as possible into the spec, ensuring a steady stream of vulnerabilities like this.<p>For instance, instead of hardcoding things that are definitely fine, they would push through a configuration knob, or champion obscure extensions to the wire protocol in the name of &quot;generality&quot;. Whenever someone else proposed a compliciation, they would fast track it as much as possible, and simplifications were black holed.<p>I can&#x27;t find a reference anywhere. Does anyone know what I&#x27;m (mis)remembering?
评论 #33423422 未加载
评论 #33423458 未加载
评论 #33430463 未加载
评论 #33423429 未加载
miduilover 2 years ago
Diff of 3.0.6 and 3.0.7: <a href="https:&#x2F;&#x2F;gist.github.com&#x2F;FiloSottile&#x2F;611fc3fa95c3aceebf2580983f76148c" rel="nofollow">https:&#x2F;&#x2F;gist.github.com&#x2F;FiloSottile&#x2F;611fc3fa95c3aceebf258098...</a><p>via <a href="https:&#x2F;&#x2F;www.twitch.tv&#x2F;filosottile" rel="nofollow">https:&#x2F;&#x2F;www.twitch.tv&#x2F;filosottile</a>
评论 #33423035 未加载
评论 #33424825 未加载
blueflowover 2 years ago
&gt; Q: Is this a branded vulnerability?<p>&gt; A: The OpenSSL project has not named or created logos for either CVE. The best way to refer to them is via the CVE names to avoid confusion.<p>I chuckled a bit, but im also sad that we ended up in this situation. The obsession with brands is, to some extent, unhealthy.
评论 #33424151 未加载
评论 #33424546 未加载
评论 #33427392 未加载
评论 #33424148 未加载
评论 #33424190 未加载
评论 #33423522 未加载
petecooperover 2 years ago
&gt;Q: Is this a branded vulnerability?<p>&gt;A: The OpenSSL project has not named or created logos for either CVE. The best way to refer to them is via the CVE names to avoid confusion.<p>&quot;I survived CVE-2022-3786 &amp; CVE-2022-3602 and all I got was this crappy t-shirt.&quot;
评论 #33423440 未加载
Faelian2over 2 years ago
Is this exploitable ? With current mitigations (NX, Stack Canary, ASLR), I don&#x27;t see how a buffer overflow on it&#x27;s own could result in Remote Code Execution.
评论 #33425525 未加载
评论 #33425075 未加载
tajenover 2 years ago
The most surprising to me is that NodeJS says they are affected <a href="https:&#x2F;&#x2F;nodejs.org&#x2F;en&#x2F;blog&#x2F;vulnerability&#x2F;openssl-november-2022&#x2F;" rel="nofollow">https:&#x2F;&#x2F;nodejs.org&#x2F;en&#x2F;blog&#x2F;vulnerability&#x2F;openssl-november-20...</a>
评论 #33423395 未加载
评论 #33423954 未加载
评论 #33423428 未加载
评论 #33425825 未加载
dangover 2 years ago
Url changed from <a href="https:&#x2F;&#x2F;mta.openssl.org&#x2F;pipermail&#x2F;openssl-announce&#x2F;2022-November&#x2F;000241.html" rel="nofollow">https:&#x2F;&#x2F;mta.openssl.org&#x2F;pipermail&#x2F;openssl-announce&#x2F;2022-Nove...</a> to a post with more background.<p>(via <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33423271" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33423271</a>, but we merged that thread hither)
stabblesover 2 years ago
If you are tired of the frequency of CVEs in OpenSSL, consider sending a formal complaint to maintainers@openssl.org\0hunter2
评论 #33425687 未加载
评论 #33424828 未加载
petecooperover 2 years ago
[deleted]
评论 #33423117 未加载
评论 #33423122 未加载