Bug 15755 - cherokee new security issue CVE-2014-4668
Summary: cherokee new security issue CVE-2014-4668
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/642029/
Whiteboard: has_procedure advisory MGA4-64-OK MGA...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-04-23 15:07 CEST by David Walser
Modified: 2015-05-03 02:20 CEST (History)
3 users (show)

See Also:
Source RPM: cherokee-1.2.103-2.mga4.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-04-23 15:07:56 CEST
Fedora has issued an advisory on April 17:
https://lists.fedoraproject.org/pipermail/package-announce/2015-April/155776.html

The upstream commit to fix it is linked in the RedHat bug:
https://bugzilla.redhat.com/show_bug.cgi?id=1114460

The patch Fedora used looks the same:
http://pkgs.fedoraproject.org/cgit/cherokee.git/plain/cherokee-1.2.103_CVE-2014-4668.patch?id=0a919b50cf5387f559abcad605851fcbb36da91a

Mageia 4 and Cauldron are affected.

Reproducible: 

Steps to Reproduce:
David Walser 2015-04-23 15:08:02 CEST

Whiteboard: (none) => MGA5TOO, MGA4TOO

Comment 1 Shlomi Fish 2015-04-23 16:02:50 CEST
(In reply to David Walser from comment #0)
> Fedora has issued an advisory on April 17:
> https://lists.fedoraproject.org/pipermail/package-announce/2015-April/155776.
> html
> 
> The upstream commit to fix it is linked in the RedHat bug:
> https://bugzilla.redhat.com/show_bug.cgi?id=1114460
> 
> The patch Fedora used looks the same:
> http://pkgs.fedoraproject.org/cgit/cherokee.git/plain/cherokee-1.2.103_CVE-
> 2014-4668.patch?id=0a919b50cf5387f559abcad605851fcbb36da91a
> 
> Mageia 4 and Cauldron are affected.
> 
> Reproducible: 
> 
> Steps to Reproduce:

Fixed in the Cauldron svn in:

------------------------------------------------------------------------
r820572 | shlomif | 2015-04-23 17:00:55 +0300 (Thu, 23 Apr 2015) | 2 lines
Changed paths:
   A /cauldron/cherokee/current/SOURCES/cherokee-1.2.103_CVE-2014-4668.patch
   M /cauldron/cherokee/current/SPECS/cherokee.spec

- Fix MGA#15755 / CVE-2014-4668 .


I'll request a Freeze Push.
Comment 2 David Walser 2015-04-24 17:24:58 CEST
cherokee-1.2.103-7.mga5 uploaded for Cauldron.

Version: Cauldron => 4
Whiteboard: MGA5TOO, MGA4TOO => (none)

Comment 3 Shlomi Fish 2015-04-24 18:11:20 CEST
(In reply to David Walser from comment #2)
> cherokee-1.2.103-7.mga5 uploaded for Cauldron.

Updated now in core/updates_testing of Mageia 4 too. Here is the advisory:

----------------------------------------

I have uploaded a patched/updated package for Mageia 4.

You can test this by installing the cherokee packages and configuring it
to serve HTTP content.

Suggested advisory:
========================

Updated cherokee packages fix security vulnerabilities:

Fedora issued an advisory regarding a new cherokee security issue
(CVE-2014-4668): The cherokee_validator_ldap_check function in validator_ldap.c
in Cherokee 1.2.103 and earlier, when LDAP is used, does not properly consider
unauthenticated-bind semantics, which allows remote attackers to bypass
authentication via an empty password.

References:
https://lists.fedoraproject.org/pipermail/package-announce/2015-April/155776.html
http://www.cvedetails.com/cve/CVE-2014-4668/
========================

Updated packages in core/updates_testing:
========================
cherokee-1.2.103-2.1.mga5
cget-1.2.103-2.1.mga5
lib(64)cherokee-base0-1.2.103-2.1.mga5
lib(64)cherokee-client0-1.2.103-2.1.mga5
lib(64)cherokee-server0-1.2.103-2.1.mga5
cherokee-devel-1.2.103-2.1.mga5
cherokee-debuginfo-1.2.103-2.1.mga5

Source RPMs:
cherokee-1.2.103-2.1.mga5.src.rpm
Comment 4 David Walser 2015-04-24 18:12:25 CEST
Thanks Shlomi!

Advisory and package list in Comment 3.

CC: (none) => shlomif
Assignee: shlomif => qa-bugs

David Walser 2015-04-27 19:27:47 CEST

URL: (none) => http://lwn.net/Vulnerabilities/642029/

Comment 5 Herman Viaene 2015-04-29 12:08:57 CEST
MGA4-32 on AcerD620.
No installation issues.
Did following test:
As root on the CLI:
cherokee-admin
Cherokee Web Server 1.2.103 (Oct 19 2013): Listening on port 127.0.0.1:9090,
TLS disabled, IPv6 enabled, using epoll, 4096 fds system limit, max. 2041
connections, caching I/O, single thread

Login:
  User:              admin
  One-time Password: LWslKwJfwbJt50yD

Web Interface:
  URL:               http://127.0.0.1:9090/

Using Firefox, went to localhost:9090, logged in with above user and password.
In Cherokee admin page: started server (make sure httpd is not running!) then, change Virtual server to have Document Root to point to /var/www/html (this one has an index.html file on the machine from apache installation). when saving, I choose the option to do a gracefull restart of the server.
Now I could point Firefox in another PC on my network to <Acer D620>:80 and get the page "It works".

CC: (none) => herman.viaene
Whiteboard: (none) => MGA4-32-OK

Comment 6 Herman Viaene 2015-04-29 14:11:06 CEST
MGA-4-64 on HP Probook 6555b KDE.
No installation issues.
Followed same procedure and results as per Comment 5.

Whiteboard: MGA4-32-OK => MGA4-32-OK MGA4-64-OK

Comment 7 Shlomi Fish 2015-04-29 14:20:43 CEST
Thanks, Herman! Adding "has_procedure" in comment https://bugs.mageia.org/show_bug.cgi?id=15755#c5 .

Whiteboard: MGA4-32-OK MGA4-64-OK => MGA4-32-OK MGA4-64-OK has_procedure

Comment 8 claire robinson 2015-04-29 20:36:05 CEST
Well done Herman. 

Removing OK's for now though as it appears the patch has been added but has not been applied.

Advisory is uploaded but will need to be updated when the package has been rebuilt so not adding the 'advisory' marker at this stage.

Whiteboard: MGA4-32-OK MGA4-64-OK has_procedure => has_procedure

Comment 9 claire robinson 2015-04-29 20:38:13 CEST
I will add a 'feedback' marker though :)

Whiteboard: has_procedure => has_procedure feedback

Comment 10 David Walser 2015-04-29 20:43:19 CEST
Fixed the patch application in SVN and asked for a freeze push.
Comment 11 David Walser 2015-04-30 23:49:50 CEST
*Actually* patched packages uploaded for Mageia 4 and Cauldron.

Shlomi: I noticed that this package owns /var/www/index.html, which I don't think it should.  It should just require webserver-base, which normally owns this file.  This can be fixed at a later time.

Advisory:
========================

Updated cherokee packages fix security vulnerability:

The cherokee_validator_ldap_check function in validator_ldap.c in Cherokee
 1.2.103 and earlier, when LDAP is used, does not properly consider
unauthenticated-bind semantics, which allows remote attackers to bypass
authentication via an empty password (CVE-2014-4668).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4668
https://lists.fedoraproject.org/pipermail/package-announce/2015-April/155776.html
========================

Updated packages in core/updates_testing:
========================
cherokee-1.2.103-2.2.mga4
cget-1.2.103-2.2.mga4
libcherokee-base0-1.2.103-2.2.mga4
libcherokee-client0-1.2.103-2.2.mga4
libcherokee-server0-1.2.103-2.2.mga4
cherokee-devel-1.2.103-2.2.mga4

from cherokee-1.2.103-2.2.mga4.src.rpm

Whiteboard: has_procedure feedback => has_procedure

Comment 12 Herman Viaene 2015-05-01 10:53:02 CEST
Tests repeated as per Comment 5 and Comment 6.
Same result, except I overlooked something then.
First access from remote machine to the webserver gives the general page 'It works' (that the one from Apache), but refreshing the page then shows the Cherokee Test Page. httpd was not running (I stopped the service previous to installing cherokee) as cherokee refuses to start when apache is running.
This happened exactly the same on the same remote machine when testing the x86-64 and the i586 machine in one straight after the other .
Looks OK to me.

Whiteboard: has_procedure => has_procedure MGA4-64-OK MGA-32-OK

Herman Viaene 2015-05-01 11:21:38 CEST

Whiteboard: has_procedure MGA4-64-OK MGA-32-OK => has_procedure MGA4-64-OK MGA4-32-OK

Comment 13 claire robinson 2015-05-02 12:24:46 CEST
Advisory updated. Validating.

Please push to 4 updates

Thanks

Keywords: (none) => validated_update
Whiteboard: has_procedure MGA4-64-OK MGA4-32-OK => has_procedure advisory MGA4-64-OK MGA4-32-OK
CC: (none) => sysadmin-bugs

Comment 14 Mageia Robot 2015-05-03 02:20:18 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0181.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.