While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.

Published at
2019-04-23
999 days ago
Modified
2019-09-20
849 days ago
2019
Year
The year of the turtle

http://www.securityfocus.com/bid/108044

BID:108044

https://issues.apache.org/jira/browse/PROTON-2014?page=com.atlassian.jira.plugin.system.issuetabpanels%3Aall-tabpanel

MISC:https://issues.apache.org/jira/browse/PROTON-2014?page=com.atlassian.jira.plugin.system.issuetabpanels%3Aall-tabpanel

https://lists.apache.org/thread.html/008ee5e78e5a090e1fcc5f6617f425e4e51d59f03d3eda2dd006df9f@%3Cusers.qpid.apache.org%3E

MLIST:[SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability

https://lists.apache.org/thread.html/d9c9a882a292e2defaed1f954528c916fb64497ce57db652727e39b0@%3Cannounce.apache.org%3E

MLIST:[announce] 20190423 [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability

http://www.openwall.com/lists/oss-security/2019/04/23/4

MLIST:[oss-security] 20190423 [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability

https://lists.apache.org/thread.html/3adb2f020f705b4fd453982992a68cd10f9d5ac728b699efdb73c1f5@%3Cdev.qpid.apache.org%3E

MLIST:[qpid-dev] 20190423 [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability

https://lists.apache.org/thread.html/49c83f0acce5ceaeffca51714ec2ba0f0199bcb8f99167181bba441b@%3Cdev.qpid.apache.org%3E

MLIST:[qpid-dev] 20190423 [jira] [Updated] (PROTON-2014) [CVE-2019-0223] TLS Man in the Middle Vulnerability

https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d@%3Ccommits.qpid.apache.org%3E

MLIST:qpid-commits] 20190423 [qpid-site] branch asf-site updated: update site content for CVE-2019-0223

https://access.redhat.com/errata/RHSA-2019:0886

REDHAT:RHSA-2019:0886

https://access.redhat.com/errata/RHSA-2019:1398

REDHAT:RHSA-2019:1398

https://access.redhat.com/errata/RHSA-2019:1399

REDHAT:RHSA-2019:1399

https://access.redhat.com/errata/RHSA-2019:1400

REDHAT:RHSA-2019:1400

https://access.redhat.com/errata/RHSA-2019:2777

REDHAT:RHSA-2019:2777

https://access.redhat.com/errata/RHSA-2019:2778

REDHAT:RHSA-2019:2778

https://access.redhat.com/errata/RHSA-2019:2779

REDHAT:RHSA-2019:2779

https://access.redhat.com/errata/RHSA-2019:2780

REDHAT:RHSA-2019:2780

https://access.redhat.com/errata/RHSA-2019:2781

REDHAT:RHSA-2019:2781

https://access.redhat.com/errata/RHSA-2019:2782

REDHAT:RHSA-2019:2782

Vulnerability RAW

{
	"Title": {
		"_text": "CVE-2019-0223"
	},
	"Notes": {
		"Note": [
			{
				"_text": "While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic."
			},
			{
				"_text": "2019-04-23"
			},
			{
				"_text": "2019-09-20"
			}
		]
	},
	"CVE": {
		"_text": "CVE-2019-0223"
	},
	"References": {
		"Reference": [
			{
				"URL": {
					"_text": "http://www.securityfocus.com/bid/108044"
				},
				"Description": {
					"_text": "BID:108044"
				}
			},
			{
				"URL": {
					"_text": "https://issues.apache.org/jira/browse/PROTON-2014?page=com.atlassian.jira.plugin.system.issuetabpanels%3Aall-tabpanel"
				},
				"Description": {
					"_text": "MISC:https://issues.apache.org/jira/browse/PROTON-2014?page=com.atlassian.jira.plugin.system.issuetabpanels%3Aall-tabpanel"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/008ee5e78e5a090e1fcc5f6617f425e4e51d59f03d3eda2dd006df9f@%3Cusers.qpid.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:[SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/d9c9a882a292e2defaed1f954528c916fb64497ce57db652727e39b0@%3Cannounce.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:[announce] 20190423 [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability"
				}
			},
			{
				"URL": {
					"_text": "http://www.openwall.com/lists/oss-security/2019/04/23/4"
				},
				"Description": {
					"_text": "MLIST:[oss-security] 20190423 [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/3adb2f020f705b4fd453982992a68cd10f9d5ac728b699efdb73c1f5@%3Cdev.qpid.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:[qpid-dev] 20190423 [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/49c83f0acce5ceaeffca51714ec2ba0f0199bcb8f99167181bba441b@%3Cdev.qpid.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:[qpid-dev] 20190423 [jira] [Updated] (PROTON-2014) [CVE-2019-0223] TLS Man in the Middle Vulnerability"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d@%3Ccommits.qpid.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:qpid-commits] 20190423 [qpid-site] branch asf-site updated: update site content for CVE-2019-0223"
				}
			},
			{
				"URL": {
					"_text": "https://access.redhat.com/errata/RHSA-2019:0886"
				},
				"Description": {
					"_text": "REDHAT:RHSA-2019:0886"
				}
			},
			{
				"URL": {
					"_text": "https://access.redhat.com/errata/RHSA-2019:1398"
				},
				"Description": {
					"_text": "REDHAT:RHSA-2019:1398"
				}
			},
			{
				"URL": {
					"_text": "https://access.redhat.com/errata/RHSA-2019:1399"
				},
				"Description": {
					"_text": "REDHAT:RHSA-2019:1399"
				}
			},
			{
				"URL": {
					"_text": "https://access.redhat.com/errata/RHSA-2019:1400"
				},
				"Description": {
					"_text": "REDHAT:RHSA-2019:1400"
				}
			},
			{
				"URL": {
					"_text": "https://access.redhat.com/errata/RHSA-2019:2777"
				},
				"Description": {
					"_text": "REDHAT:RHSA-2019:2777"
				}
			},
			{
				"URL": {
					"_text": "https://access.redhat.com/errata/RHSA-2019:2778"
				},
				"Description": {
					"_text": "REDHAT:RHSA-2019:2778"
				}
			},
			{
				"URL": {
					"_text": "https://access.redhat.com/errata/RHSA-2019:2779"
				},
				"Description": {
					"_text": "REDHAT:RHSA-2019:2779"
				}
			},
			{
				"URL": {
					"_text": "https://access.redhat.com/errata/RHSA-2019:2780"
				},
				"Description": {
					"_text": "REDHAT:RHSA-2019:2780"
				}
			},
			{
				"URL": {
					"_text": "https://access.redhat.com/errata/RHSA-2019:2781"
				},
				"Description": {
					"_text": "REDHAT:RHSA-2019:2781"
				}
			},
			{
				"URL": {
					"_text": "https://access.redhat.com/errata/RHSA-2019:2782"
				},
				"Description": {
					"_text": "REDHAT:RHSA-2019:2782"
				}
			}
		]
	}
}