Support option to disable TLS compression to protect against CRIME attack

Bug #1068854 reported by Reed Loden on 2012-10-19
288
This bug affects 4 people
Affects Status Importance Assigned to Milestone
Apache2 Web Server
Unknown
Unknown
apache2 (Debian)
Fix Released
Unknown
apache2 (Fedora)
Unknown
Unknown
apache2 (Ubuntu)
Undecided
Unassigned

Bug Description

Upstream Apache recently committed a change to be in Apache 2.2.24 (not yet released) that would allow for disabling TLS compression to protect against the CRIME attack. As it's probably going to be a way before 2.2.24 is released, it would be great to backport this patch as a one-off SRU to at least precise (LTS) and quantal until the new release. There's also been some mention that supporting TLS compression is possibly causing some people's PCI compliance tests to fail, so having this option would be extremely useful to help pass their compliance tests (plus just protecting against CRIME and CRIME-like attacks).

More info:
https://issues.apache.org/bugzilla/show_bug.cgi?id=53219
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=674142
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689936
https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls
http://isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html

CVE References

Reed Loden (reed) wrote :

Note that Red Hat already supports a workaround [0] that allows for disabling zlib at the OpenSSL layer, which prevents TLS compression working in Apache. As far as I am aware, no such option exists for Ubuntu, leaving users vulnerable until a new package is available.

[0] https://bugzilla.redhat.com/show_bug.cgi?id=857051#c5

Robie Basak (racb) on 2012-10-21
information type: Public → Public Security
Changed in apache2 (Debian):
status: Unknown → Confirmed
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in apache2 (Ubuntu):
status: New → Confirmed
Changed in apache2 (Debian):
status: Confirmed → Fix Released
Reed Loden (reed) wrote :

Debian just released apache2 v2.2.22-12 to address this issue.

Changed in apache2 (Ubuntu):
status: Confirmed → Fix Released
Reed Loden (reed) wrote :

Virendra, as far as I know, this isn't in any released Apache version.

Changed in apache2 (Ubuntu):
status: Fix Released → Confirmed
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package apache2 - 2.2.8-1ubuntu0.24

---------------
apache2 (2.2.8-1ubuntu0.24) hardy-security; urgency=low

  * SECURITY UPDATE: XSS vulnerability in mod_negotiation
    - debian/patches/224_CVE-2012-2687.dpatch: escape filenames in
      modules/mappers/mod_negotiation.c.
    - CVE-2012-2687
  * SECURITY UPDATE: CRIME attack ssl attack (LP: #1068854)
    - debian/patches/225_CVE-2012-4929.dpatch: backport SSLCompression
      on|off directive. Defaults to off as enabling compression enables the
      CRIME attack.
    - CVE-2012-4929
 -- Marc Deslauriers <email address hidden> Tue, 06 Nov 2012 15:01:07 -0500

Changed in apache2 (Ubuntu):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public Security information  Edit
Everyone can see this security related information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.