Bug#752610: lynx: Can connect to CVE-2014-1959 test site

Kurt Roeckx kurt at roeckx.be
Wed Jun 25 07:03:25 UTC 2014


Package: lynx-cur, libgnutls26
Severity: serious
Tags: security

Hi,

There is a test site for checking the gnutls bug:
https://gnutls.notary.icsi.berkeley.edu/

I can connect to it and get the message:
   If you see this without getting a certificate error you are
   vulnerable against the GnuTLS bug

I can reproduce this with the following combinations:
stable:
ii  libgnutls26:amd64  2.12.20-8+deb7u2
ii  lynx-cur           2.8.8dev.12-2

And testing:
ii  libgnutls26:amd64  2.12.23-16
ii  lynx-cur           2.8.8pre5-1


Using gnutls-bin gnutls-bin 3.0.22-3+really2.12.20-8+deb7u2 I also
get:
$ gnutls-cli -p 443 gnutls.notary.icsi.berkeley.edu --x509cafile /etc/ssl/certs/ca-certificates.crt
Processed 159 CA certificate(s).
Resolving 'gnutls.notary.icsi.berkeley.edu'...
Connecting to '192.150.187.13:443'...
*** Verifying server certificate failed...
*** Fatal error: Error in the certificate.
*** Handshake has failed
GnuTLS error: Error in the certificate.

While with 3.3.2-2 I get:
$ gnutls-cli -p 443 gnutls.notary.icsi.berkeley.edu --x509cafile /etc/ssl/certs/ca-certificates.crt
Processed 168 CA certificate(s).
Resolving 'gnutls.notary.icsi.berkeley.edu'...
Connecting to '192.150.187.13:443'...
- Certificate type: X.509
- Got a certificate list of 2 certificates.
- Certificate[0] info:
 - subject `CN=gnutls.notary.icsi.berkeley.edu,OU=ICSI GnuTLS Crt,O=ICSI GnuTLS Test Cert.', issuer `C=US,ST=Arizona,L=Scottsdale,O=GoDaddy.com\, Inc.,OU=http://certificates.godaddy.com/repository,CN=Go Daddy Secure Certification Authority,serialNumber=07969287', RSA key 2048 bits, signed using RSA-SHA1, activated `2010-08-28 14:51:35 UTC', expires `2015-08-28 14:51:35 UTC', SHA-1 fingerprint `b20c942cd0dd72cd5a02b697ba6862064727f3d9'
        Public Key ID:
                c9952718d6b2c42cd432b9d8c0f0730ab3286c9d
        Public key's random art:
                +--[ RSA 2048]----+
                |  .o ..=o.       |
                |   .o =.*o..     |
                |  o o+.*.o+ .    |
                |...+o+o..o o     |
                |oo.E.   S        |
                |o                |
                |                 |
                |                 |
                |                 |
                +-----------------+

- Certificate[1] info:
 - subject `C=US,ST=Arizona,L=Scottsdale,O=GoDaddy.com\, Inc.,OU=http://certificates.godaddy.com/repository,CN=Go Daddy Secure Certification Authority,serialNumber=07969287', issuer `C=US,O=The Go Daddy Group\, Inc.,OU=Go Daddy Class 2 Certification Authority', RSA key 2048 bits, signed using RSA-SHA1, activated `2006-11-16 01:54:37 UTC', expires `2026-11-16 01:54:37 UTC', SHA-1 fingerprint `7c4656c3061f7f4c0d67b319a855f60ebc11fc44'
- Status: The certificate is NOT trusted. The certificate issuer is not a CA.
*** PKI verification of server certificate failed...
*** Fatal error: Error in the certificate.
*** Handshake has failed
GnuTLS error: Error in the certificate.


The 3.3.2-2 version is linked to libgnutls28 of course.


Kurt



More information about the Pkg-gnutls-maint mailing list