The cosign development team has released cosign 3.1.3. This release is a 
security update.

The cosign development team has identified a flaw in the handling of regular 
expression matching in the cosign.conf file, affecting all cosign 3.x releases. 
As a result of this flaw, cosignd may allow a client to connect by matching 
against a substring of the certificate Common Name (CN) presented by a client.

Exploitation of the vulnerability requires guessing a value in the cosign.conf, 
knowledge of and access to a certificate authority trusted by the cosign 
daemon, and a specially crafted certificate issued by such a CA. The cosign 
development team has rated this vulnerability moderate.

All weblogin administrators should immediately place regular expression anchors 
on the cgi pattern in the cosign.conf, e.g.:

cgi weblogin-cgi

should become:

cgi ^weblogin-cgi$

Restart the cosign daemon (cosignd) on each weblogin server in your pool after 
making this change. After taking these steps, your deployment will no longer be 
exposed.

Further details of the vulnerability can be found at:

http://cosign.sourceforge.net/cosign-vuln-2011-001.txt

Organizations maintaining cosign weblogin servers are encouraged to update to 
cosign 3.1.3 immediately, apply the workaround described above, or backport the 
patch linked below. [1]


Download:
        
<http://sourceforge.net/projects/cosign/files/cosign/cosign-3.1.3/cosign-3.1.3.tar.gz/download>
        * SHA256(cosign-3.1.3.tar.gz)= 
3eae54c03a61545b9180374a677179efc1273babaf78907ead3d16c353dbccab
        * SHA1(cosign-3.1.3.tar.gz)= bccb5b43f8cabf1df2d8508c10bfb2f22354ae24
        * RIPEMD160(cosign-3.1.3.tar.gz)= 
077740b6b1f651da3ee98f5e455c200dea82f143

        git://cosign.git.sourceforge.net/gitroot/cosign/cosign
        Tag: cosign-3.1.3, GPG-signed with key ID 1FB01F5D.

Changes from 3.1.2:
        common: Apply implicit anchoring to all regular expression matching.

More Info:
        http://sourceforge.net/projects/cosign/
        http://weblogin.org/

Feel free to contact me with questions or concerns. Please continue to report 
bugs, submit patches and request features on the SF.net tracker. Thanks for 
your support of Cosign.

andrew

[1] <http://cosign.sourceforge.net/patches/cosign-vuln-2011-001.patch>
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Cosign-discuss mailing list
Cosign-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/cosign-discuss

Reply via email to