7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.044 Low
EPSS
Percentile
92.3%
The Mozilla Network Security Services (NSS) library fails to properly verify RSA signatures due to incorrect ASN.1 parsing of DigestInfo. This vulnerability may allow an attacker to forge a RSA signature, such as a SSL certificate.
CWE-295: Improper Certificate Validation
RSA signatures are used to authenticate the source of a message. To prevent RSA signatures from being forged, messages are padded with data to ensure message hashes are adequately sized. The Public-Key Cryptography Standard #1 version 1.5 (PKCS#1 v1.5), which is defined in RFC 2313, specifies “the mathematical properties and format of RSA public and private keys (ASN.1-encoded in clear-text), and the basic algorithms and encoding/padding schemes for performing RSA encryption, decryption, and producing and verifying signatures” (Wikipedia). The Mozilla Network Security Services (NSS) library incorrectly parses PKCS#1 v1.5 padded signatures due to the use of a vulnerable implementation of ASN.1 encoding of DigestInfo. Vulnerable implementations parse the DigestInfo field using the BER encoding, which allows multiple ways of encoding the same ASN.1 object. The parser implementation allows for bytes to skip validation, allowing an attacker to forge a signature when a RSA key with a low public exponent (e.g., three) is used.
This vulnerability is a variant of the Bleichenbacher vulnerability, where unvalidated bytes are allowed in the least significant bytes of the signature.
Mozilla NSS is used by other software products including a number of Linux distributions and packages, Google Chrome, and Google Chrome OS. It is also possible that other cryptographic libraries may have similar vulnerabilities.
This vulnerability may allow an attacker to forge a RSA signature, such as a SSL certificate.
Apply an Update
Mozilla has released patch for this vulnerability (MSFA 2014-73). Mozilla NSS is used by other software products including a number of Linux distributions and packages, Google Chrome, and Google Chrome OS.
772676
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: September 24, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 22, 2014 Updated: September 24, 2014
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: September 24, 2014 Updated: September 24, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 23, 2014 Updated: September 23, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 23, 2014 Updated: September 23, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 23, 2014 Updated: September 23, 2014
Unknown
We have not received a statement from the vendor.
Notified: September 23, 2014 Updated: September 23, 2014
Unknown
We have not received a statement from the vendor.
Group | Score | Vector |
---|---|---|
Base | 8.8 | AV:N/AC:M/Au:N/C:C/I:C/A:N |
Temporal | 6.9 | E:POC/RL:OF/RC:C |
Environmental | 8.7 | CDP:H/TD:H/CR:H/IR:H/AR:ND |
Thanks to Advanced Threat Research - Intel Security for reporting this vulnerability. Antoine Delignat-Lavaud, a researcher for team Prosecco of Inria Paris, also reported this to Mozilla.
This document was written by Joel Land and Chris King.
CVE IDs: | CVE-2014-1568 |
---|---|
Date Public: | 2014-09-24 Date First Published: |
en.wikipedia.org/wiki/PKCS#1
www.imc.org/ietf-openpgp/mail-archive/msg06063.html
bugzilla.mozilla.org/show_bug.cgi?id=1064636
bugzilla.mozilla.org/show_bug.cgi?id=1069405
developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS
developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_Releases
www.ietf.org/rfc/rfc2313.txt
www.mozilla.org/security/announce/2014/mfsa2014-73.html