Jump to content
Not connected, Your IP: 18.188.113.185
Wazzza

New multiple OpenSSL vulnerabilities

Recommended Posts

 

OpenSSL Security Advisory [05 Jun 2014]========================================SSL/TLS MITM vulnerability (CVE-2014-0224)===========================================An attacker using a carefully crafted handshake can force the use of weakkeying material in OpenSSL SSL/TLS clients and servers. This can be exploitedby a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server.The attack can only be performed between a vulnerable client *and*server. OpenSSL clients are vulnerable in all versions of OpenSSL. Serversare only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Usersof OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution.OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za.OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m.OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h.Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for discovering andresearching this issue.  This issue was reported to OpenSSL on 1st May2014 via JPCERT/CC.The fix was developed by Stephen Henson of the OpenSSL core team partly basedon an original patch from KIKUCHI Masashi.DTLS recursion flaw (CVE-2014-0221)====================================By sending an invalid DTLS handshake to an OpenSSL DTLS client the codecan be made to recurse eventually crashing in a DoS attack.Only applications using OpenSSL as a DTLS client are affected.OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8zaOpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m.OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h.Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue.  Thisissue was reported to OpenSSL on 9th May 2014.The fix was developed by Stephen Henson of the OpenSSL core team.DTLS invalid fragment vulnerability (CVE-2014-0195)====================================================A buffer overrun attack can be triggered by sending invalid DTLS fragmentsto an OpenSSL DTLS client or server. This is potentially exploitable torun arbitrary code on a vulnerable client or server.Only applications using OpenSSL as a DTLS client or server affected.OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8zaOpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m.OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h.Thanks to Jüri Aedla for reporting this issue.  This issue wasreported to OpenSSL on 23rd April 2014 via HP ZDI.The fix was developed by Stephen Henson of the OpenSSL core team.SSL_MODE_RELEASE_BUFFERS NULL pointer dereference (CVE-2014-0198)=================================================================A flaw in the do_ssl3_write function can allow remote attackers tocause a denial of service via a NULL pointer dereference.  This flawonly affects OpenSSL 1.0.0 and 1.0.1 where SSL_MODE_RELEASE_BUFFERS isenabled, which is not the default and not common.OpenSSL 1.0.0 users should upgrade to 1.0.0m.OpenSSL 1.0.1 users should upgrade to 1.0.1h.This issue was reported in public.  The fix was developed byMatt Caswell of the OpenSSL development team.SSL_MODE_RELEASE_BUFFERS session injection or denial of service (CVE-2010-5298)=============================================================================== A race condition in the ssl3_read_bytes function can allow remoteattackers to inject data across sessions or cause a denial of service.This flaw only affects multithreaded applications using OpenSSL 1.0.0and 1.0.1, where SSL_MODE_RELEASE_BUFFERS is enabled, which is not thedefault and not common.OpenSSL 1.0.0 users should upgrade to 1.0.0m.OpenSSL 1.0.1 users should upgrade to 1.0.1h.This issue was reported in public.  Anonymous ECDH denial of service (CVE-2014-3470)================================================OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to adenial of service attack.OpenSSL 0.9.8 users should upgrade to 0.9.8zaOpenSSL 1.0.0 users should upgrade to 1.0.0m.OpenSSL 1.0.1 users should upgrade to 1.0.1h.Thanks to Felix Gröbert and Ivan Fratrić at Google for discovering thisissue.  This issue was reported to OpenSSL on 28th May 2014.The fix was developed by Stephen Henson of the OpenSSL core team.Other issues============OpenSSL 1.0.0m and OpenSSL 0.9.8za also contain a fix forCVE-2014-0076: Fix for the attack described in the paper "RecoveringOpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"Reported by Yuval Yarom and Naomi Benger.  This issue was previouslyfixed in OpenSSL 1.0.1g.References==========URL for this Security Advisory:http://www.openssl.org/news/secadv_20140605.txtNote: the online version of the advisory may be updated with additionaldetails over time.

 

Share this post


Link to post

  Hello Wazzza,

Thank you for updating me and other airvpn members with your posting.

  Regards,

     Solex1

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...