Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash
Categories
(NSS :: Libraries, defect)
Tracking
(firefox49 unaffected, firefox-esr45 fixed, firefox50 unaffected, firefox51 unaffected, firefox52 unaffected)
Tracking | Status | |
---|---|---|
firefox49 | --- | unaffected |
firefox-esr45 | --- | fixed |
firefox50 | --- | unaffected |
firefox51 | --- | unaffected |
firefox52 | --- | unaffected |
People
(Reporter: KaiE, Unassigned)
References
Details
(Keywords: sec-moderate, wsec-dos)
Attachments
(1 file)
458 bytes,
patch
|
KaiE
:
review+
|
Details | Diff | Splinter Review |
Comment 1•8 years ago
|
||
Comment 2•8 years ago
|
||
Comment 3•8 years ago
|
||
Comment 4•8 years ago
|
||
Updated•8 years ago
|
Comment 5•8 years ago
|
||
Updated•8 years ago
|
Comment 6•8 years ago
|
||
Comment 7•8 years ago
|
||
Comment 8•8 years ago
|
||
Reporter | ||
Comment 9•8 years ago
|
||
Reporter | ||
Comment 10•8 years ago
|
||
Reporter | ||
Comment 11•8 years ago
|
||
Reporter | ||
Updated•8 years ago
|
Reporter | ||
Updated•8 years ago
|
Reporter | ||
Comment 12•8 years ago
|
||
Comment 14•8 years ago
|
||
Comment 16•8 years ago
|
||
Reporter | ||
Comment 17•8 years ago
|
||
Reporter | ||
Comment 18•8 years ago
|
||
Updated•8 years ago
|
Updated•8 years ago
|
Reporter | ||
Updated•8 years ago
|
Updated•8 years ago
|
Comment 19•4 years ago
|
||
(In reply to Robert Relyea from comment #1)
Also, this isn't the only path through that could be an issue. The constant
time mac is only used for block ciphers, AES_GCM would trigger
ssl3_ComputeRecordMAC which will use a different NSS functions
(PK11_DigestBegin, PK11_DigestOp PK11_DigestFinal). The bypass path may not
actually fail, but it will allow MITM attacks on the mac, since it will
generate macs with NULL keys.bob
Do we have a test case for this yet?
Is this bug actually just a null deference then? Seems like it might have been misclassified based on this comment.
Comment 20•4 years ago
|
||
The original bug was a NULL dereference in the ssl engine, which has been fixed. My comment was about the bypass code with would treat the null as an empty key and merrily continue on with generating and accepting macs with known empty keys. It's not really and issue anymore because we've since removed all the bypass code (even at the time it wasn't used by anyone).
Description
•