Note: This is an archival copy of Security Sun Alert 273029 as previously published on http://sunsolve.sun.com.
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1021653.1.
Article ID : 1021653.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2010-06-22
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

Security Vulnerability in the Transport Layer Security (TLS) and Secure Sockets Layer 3.0 (SSLv3) Protocols Involving Handshake Renegotiation Affects OpenSSL



Category
Security

Release Phase
Resolved

Bug Id
SUNBUG: 6898546
SUNBUG: 6898539

Product
Solaris 10 Operating System
OpenSolaris

Date of Workaround Release
19-Nov-2009

Date of Resolved Release:
22-Jun-2010

Security Vulnerability in the Transport Layer Security (TLS) and Secure Sockets Layer 3.0 (SSLv3) Protocols Involving Handshake Renegotiation Affects OpenSSL

1. Impact

A security vulnerability in the Transport Layer Security (TLS) and Secure Sockets Layer 3.0 (SSLv3) protocols in the handling of session renegotiations affects OpenSSL (see openssl(5)). This issue may allow a remote unauthenticated user with the ability to intercept and control network traffic to perform man-in-the-middle (MITM) attack to inject arbitrary plaintext at the beginning of the application protocol stream, thus compromising the integrity of the communication. This vulnerability does not allow one to decrypt the intercepted network communication.

The exact nature of the impact of compromised data integrity depends on the application making use of the OpenSSL libraries.

Sun acknowledges with thanks, Marsh Ray and Steve Dispensa of PhoneFactor for bringing this issue to our attention.

This issue is also referenced in the following documents:


2. Contributing Factors

This issue can occur in the following releases:

SPARC Platform
  • Solaris 10 without patches 143140-04 and 145102-01
  • OpenSolaris based upon builds snv_01 through snv_128
x86 Platform
  • Solaris 10 without patch 141525-10
  • OpenSolaris based upon builds snv_01 through snv_128
Notes:
 
1. Solaris 8 is not impacted by this issue.
2. Solaris 9 does not ship with OpenSSL libraries which can be used for application linking and is thus not impacted by this issue.

OpenSolaris distributions may include additional bug fixes above and beyond the build from which it was derived.  The base build can be derived as follows:
$ uname -v
snv_101
3. Symptoms

There are no predictable symptoms that would indicate the described issue has occurred.

4. Workaround

Solaris Kernel SSL proxy module, KSSL (see ksslcfg(1M)) does not support client renegotiation or rehandshake. Server applications which use the KSSL module are not affected by this issue. KSSL may be used to work around the described issue in such applications.

5. Resolution

This issue is addressed for applications that do not depend on TLS session renegotiations in the following releases:

SPARC Platform
  • Solaris 10 with patches 143140-04 or later and 145102-01 or later
  • OpenSolaris based upon builds snv_129 or later
x86 Platform
  • Solaris 10 with patch 141525-10 or later
  • OpenSolaris based upon builds snv_129 or later

SUNPATCH 143140-04
SUNPATCH 145102-01
SUNPATCH 141525-10

Modification History
03-Dec-2009: Updated Contributing Factors and Resolution sections for OpenSolaris
22-Jun-2010: Updated Contributing Factors and Resolution sections for patch release; issue is Resolved




Attachments
This solution has no attachment