*** This bug is a security vulnerability ***

Public security bug reported:

The following security bug was published for mbedtls:

[Vulnerability]
If a malicious peer supplies an X.509 certificate chain that has more
than MBEDTLS_X509_MAX_INTERMEDIATE_CA intermediates (which by default is
8), it could bypass authentication of the certificates, when the
authentication mode was set to 'optional' eg.
MBEDTLS_SSL_VERIFY_OPTIONAL. The issue could be triggered remotely by
both the client and server sides.

If the authentication mode, which can be set by the function
mbedtls_ssl_conf_authmode(), was set to 'required' eg.
MBEDTLS_SSL_VERIFY_REQUIRED which is the default, authentication would
occur normally as intended.

[Impact]
Depending on the platform, an attack exploiting this vulnerability could
allow successful impersonation of the intended peer and permit
man-in-the-middle attacks.

https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-
advisory-2017-02

As far as I can tell, mbed TLS in xenial, zesty and artful are affected.
No version of polarssl is affected.

** Affects: mbedtls (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: mbedtls (Debian)
     Importance: Unknown
         Status: Unknown

** Information type changed from Private Security to Public Security

** Bug watch added: Debian Bug tracker #873557
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873557

** Also affects: mbedtls (Debian) via
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873557
   Importance: Unknown
       Status: Unknown

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14032

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1714640

Title:
  CVE-2017-14032 - certificate authentication bypass

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mbedtls/+bug/1714640/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to