ZNC SSL listeners are vulnerable to POODLE.

Bug #1389264 reported by Thomas Ward
262
This bug affects 2 people
Affects Status Importance Assigned to Milestone
znc (Ubuntu)
Fix Released
Medium
Unassigned
Precise
Won't Fix
Medium
Unassigned
Trusty
Confirmed
Medium
Unassigned
Utopic
Won't Fix
Medium
Unassigned
Vivid
Fix Released
Medium
Unassigned

Bug Description

This is a report on the state of the ZNC package in Ubuntu.

Currently, the ZNC package is vulnerable to CVE-2014-3566 and the POODLE vulnerability. It does not disable SSLv3 and does not permit an individual to change what is or is not enabled in SSL protocols.

An upstream ZNC issue was opened on this issue, requesting that the insecure SSLv2 and SSLv3 are disabled, as well as a request to be able to specify the SSL Ciphers to be used. That issue is at https://github.com/znc/znc/issues/621.

https://github.com/jpnurmi/znc/commit/954f22ccc0ee8a77ed96756e154993dc9e8402af is the relevant code commit which fixes the SSLv3 support issue and disables SSLv2 and SSlv3.

The related CVE is the OpenSSL POODLE vulnerability - CVE-2014-3566.

All versions of the ZNC software are affected at this time.

Tags: poodle

CVE References

Revision history for this message
Thomas Ward (teward) wrote :

Discussion in #ubuntu-hardened with mdeslaur has made a point: We don't wish to disable SSLv3 in the stable versions currently in the packages.

There are upstream code reviews in progress for an option to disable SSL protocols in the configuration file, and that may be an acceptable alternative change.

tags: added: poodle
Thomas Ward (teward)
Changed in znc (Ubuntu Utopic):
status: New → Confirmed
Changed in znc (Ubuntu Trusty):
status: New → Confirmed
Changed in znc (Ubuntu Precise):
status: New → Confirmed
Revision history for this message
Thomas Ward (teward) wrote :

After discussion with the Security team, and Upstream ZNC rejecting the changes to incorporate the ability to selectively disable protocols, this is not going to be fixable in any of the stable releases (Precise, Trusty, Utopic).

Therefore, the current path of approach is going to be putting the "Disable SSLv2/SSLv3" code change into Vivid, and leave the rest alone. (Marking Precise, Trusty, Utopic as "Won't Fix" accordingly, per my discussion with mdeslaur in #ubuntu-hardened on this issue.)

Changed in znc (Ubuntu Trusty):
status: Confirmed → Won't Fix
Changed in znc (Ubuntu Utopic):
status: Confirmed → Won't Fix
Changed in znc (Ubuntu Precise):
status: Confirmed → Won't Fix
Revision history for this message
Thomas Ward (teward) wrote :

Further changes and updates. Upstream ZNC has accepted commits to accept SSL protocol configuration to select the protocols you want to support. https://github.com/znc/znc/pull/728/files

This was facilitated by commits to the CSocket program/library that ZNC uses and includes with itself.

The commit contains four git commits:
(1) Update CSocket.
(2) Fix the non-SSL builds
(3) Disable SSL Compression (to mitigate CRIME vulnerability)
(4) Add a configuration option to define SSL protocols that are supported.

I discussed this with mdeslaur. Adding the configuration option to define SSL protocols may be more feasible to include than to outright disable the SSL protocol for SSLv3 on its own. This would also potentially apply as a valid SRU to older releases, thereby making this security issue a null point. To the end that this could be a possible SRU, I'm marking everything as "Confirmed" rather than "Won't Fix", pending a discussion with the SRU team ahead of uploading debdiffs.

Changed in znc (Ubuntu Precise):
status: Won't Fix → Confirmed
Changed in znc (Ubuntu Trusty):
status: Won't Fix → Confirmed
Changed in znc (Ubuntu Utopic):
status: Won't Fix → Confirmed
Revision history for this message
Thomas Ward (teward) wrote :

More updates.

Unfortunately, it's going to be pretty invasive to try and fix this in pre-1.0 versions of the ZNC package, because the CSocket changes won't apply cleanly, and I am not familiar enough to make the changes to make it work. As well, upstream in Debian, their security team representative, over emails, has stated that it's too invasive for them to include in anything other than 1.4-1 which is in Wheezy and Sid.

Because I've failed to get this to build in anything before ZNC 1.0, I'm going to "Won't Fix" this for Precise, which has 0.206.

I'm still working on Trusty, Utopic, and Vivid, but with Vivid I'm more likely to request a merge or sync once Debian updates with the changes to enable SSL protocol selection.

Changed in znc (Ubuntu Precise):
status: Confirmed → Won't Fix
Revision history for this message
Aminda Suomalainen (mikaela) wrote :

ZNC 1.6.0 fixes this and FREAK which wasn't known issue at that time. Currently all ZNC versions older than 1.6.0 are vulnerable to FREAK in addition to POODLE.

Revision history for this message
Aminda Suomalainen (mikaela) wrote :

According to http://packages.ubuntu.com/vivid/znc Vivid has ZNC 1.6.0 and this issue and FREAK are fixed in it.

Revision history for this message
Thomas Ward (teward) wrote :

Confirmed comment #7. this slipped my radar. Marking vivid fixed as a result.

Changed in znc (Ubuntu Vivid):
status: Confirmed → Fix Released
Revision history for this message
Thomas Ward (teward) wrote :

Mikaela: See https://bugs.launchpad.net/ubuntu/+source/znc/+bug/1444943 for the (start) of work to get ZNC 1.6.0 into trusty-backports and utopic-backports. While this doesn't fully address the Security bug, it does provide the 1.6.0 functionality via the backports repository.

Mathew Hodson (mhodson)
Changed in znc (Ubuntu Utopic):
status: Confirmed → Won't Fix
Changed in znc (Ubuntu):
importance: Undecided → Medium
Changed in znc (Ubuntu Precise):
importance: Undecided → Medium
Changed in znc (Ubuntu Trusty):
importance: Undecided → Medium
Changed in znc (Ubuntu Utopic):
importance: Undecided → Medium
Changed in znc (Ubuntu Vivid):
importance: Undecided → Medium
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.