Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <52EF4F92.2060103@redhat.com>
Date: Mon, 03 Feb 2014 01:13:06 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: Re: OpenSSH J-PAKE vulnerability (no cause for
 panic! remain calm!)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 01/29/2014 06:50 AM, cve-assign@...re.org wrote:
> Use CVE-2014-1692. The CVE description will indicate that the
> issue requires an unusual installation.
> 
>> As I understand it this can be enabled via code edit/gcc command
>> line options, so not sure if this qualified for a CVE or not
>> (vuln in code, yes, is code reachable? not under any default
>> setup, and even on non-default you have to go pretty far off to
>> enable it).
> 
> An impact on the default installation isn't necessary.
> Vulnerabilities that occur only after the user modifies code aren't
> eligible for a CVE. However, if there's some type of "installation
> option" mentioned by the vendor, someone may have chosen that
> option, and it may be worthwhile to track the issue with a CVE. The
> nature of an "installation option" obviously varies widely across
> both open-source and closed-source products.
> 
> In this case, there's:
> 
>> http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Makefile.inc
>
>>  Add support for an experimental zero-knowledge password
>> authentication method using the J-PAKE protocol ...
> 
>> This is experimental, work-in-progress code and is presently 
>> compiled-time disabled (turn on -DJPAKE in Makefile.inc).
> 
>> http://www.openbsd.org/cgi-bin/cvsweb/~checkout~/src/usr.bin/ssh/Makefile.inc?rev=1.41;content-type=text%2Fplain
>
>>  #CFLAGS+=	-DJPAKE
> 
> This is close to the edge of what "installation option" means, but
> our feeling is that the vendor wouldn't have provided that #CFLAGS
> line at all unless it were expected that an end user might want to
> make the one-character change.

Just to close this email thread, Mitre assigned one:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1692

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=WJSy
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.