1 -------------------------------------------------------------
2 2010-01-10 (Updated 2010-01-13): GNUTLS subkey verification
4 GnuTLS (tested with 2.8.5) does not verify OpenPGP certificates
5 having subkeys properly even if you tell it to check the key.
8 - Enables impersonation of servers (compromises confidentiality)
9 - Enables impersonation of clients (compromises integerity).
12 Command/code execution: No
13 Platforms vulernable: Any with vulernable GnuTLS version
16 - Worked around in b0ff3ea457e7db6637312beddf1f6629858ac116 by
18 - Upgrade GnuTLS to non-vulernable version
19 - With unpatched server, don't rely on keypair authentication
20 server side (password and Unix authentication are unaffected).
21 - With unpatched client, don't push anything confidential.
23 -------------------------------------------------------------
24 2010-01-13: Memory corruption in packet decoding
26 Packet decoding assumes that strings are not chunked in memory and
27 if this is not true, corrupts memory. Carefully crafted requests
28 can lead to arbitrary code execution with some STL implementations
29 (I know no such implementation).
32 - Arbitrary code execution from remote.
35 Command/code execution: Yes
36 Platforms vulernable: None known
39 - Verify that STL used always allocates strings in one hunk (with
40 such implementation, exploiting this issue is provably impossible).
41 - Upgrade to version with fix.
43 GNU libstdc++ does appear to always allocate strings in one hunk
45 -------------------------------------------------------------
46 2010-02-08: Reading past end of buffer in RSA signature verification
48 RSA verification can read past end of buffer with suitably malformed
52 - May in some circumstances crash the daemon.
55 Command/code execution: no
56 Plaforms vulnerable: All
59 - Upgrade to version with fix.
61 -------------------------------------------------------------
62 2010-02-12: SSH authentication MITM
64 If RSA key exchange is used, then SSH authentication can be
65 replayed by active attacker allowing impersonating the user for
66 single session (assuming attacker can impersonate server without
67 tripping hostkey validation).
69 If Diffie-Hellman key exchange is used, the attack does not
70 work, since it would require cracking either peer's half-key
71 in realtime (that would allow MITM anyway).
73 Note that this doesn't circumvent server hostkey checks done
77 - Unauthorized access to hosted repositories.
80 Command/code execution: no
81 Plaforms vulnerable: All
84 - Ensure that server doesn't have RSA hostkey. If there is only
85 DSA hostkey, RSA key exchange can't be used.
86 - Be extra careful in checking hostkeys.
87 - Use password authentication / OpenPGP keys.
88 - Upgrade to fixed version (if client is fixed, its
89 authentications can't be replayed, if server is fixed,
90 replayed authentications can't be used for authenticating
93 -------------------------------------------------------------