SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   OpenSSL Vendors:   OpenSSL.org
(EnGarde Issues Fix) OpenSSL Has Multiple Buffer Overflows That Allow Remote Users to Execute Arbitrary Code with Root Privileges
SecurityTracker Alert ID:  1004987
SecurityTracker URL:  http://securitytracker.com/id/1004987
CVE Reference:   CVE-2002-0655, CVE-2002-0656, CVE-2002-0657, CVE-2002-0659   (Links to External Site)
Date:  Aug 8 2002
Impact:   Denial of service via network, Execution of arbitrary code via network, Root access via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 0.9.6d or earlier, 0.9.7-beta2 or earlier, 0.9.7 current development snapshots
Description:   Four buffer overflow conditions were reported in OpenSSL. All four may allow a remote user to execute arbitrary code.

The vendor has reported that A.L. Digital Ltd and The Bunker have uncovered multiple buffer overflows in OpenSSL, discovered during a security review.

A remote user could create a specially crafted, oversized client master key and use SSL2 to trigger an overflow on an SSL server. According to the report, this vulnerability was independently discovered by Neohapsis, which has confirmed that the overflow can be exploited to execute arbitrary code.

A remote user with an SSL server could create a specially crafted, oversized session ID and supply this ID to a target client using SSL3 to trigger an overflow.

A remote user could supply a specially crafted, oversized master key to an SSL3 server to trigger an overflow. It is reported that this flaw affects OpenSSL 0.9.7 prior to version 0.9.7-beta3 when Kerberos is enabled.

Several buffers used for ASCII representations of integers are reportedly too small on 64 bit platforms.

The report also states that other potential buffer overflows that are currently considered to be non-exploitable have been discovered.

The vendor notes that Adi Stav and James Yonan independently reported that the ASN1 parser can be confused by certain invalid encodings, potentially allowing a remote user to cause denial of service conditions. An OpenSSL-based application that use the ASN1 library to parse untrusted data (including all SSL or TLS applications using S/MIME [PKCS#7] or certificate generation routines) are affected.

Impact:   A remote user acting as an SSL client could execute arbitrary code on an SSL server. A remote user acting as an SSL server could cause arbitrary code to be executed on an SSL client that is connecting to the server. In each case, the code would run with privileges of the affected implementation.

A remote user may be able cause denial of service conditions.

Solution:   EnGarde has released a fix. Users of the EnGarde Professional edition can use the Guardian Digital Secure Network to update their systems automatically.

EnGarde Community users should upgrade to the most recent version as outlined in this advisory. Updates may be obtained from:

ftp://ftp.engardelinux.org/pub/engarde/stable/updates/
http://ftp.engardelinux.org/pub/engarde/stable/updates/

Before upgrading the package, the machine must either:

a) be booted into a "standard" kernel; or
b) have LIDS disabled.

To disable LIDS, execute the command:

# /sbin/lidsadm -S -- -LIDS_GLOBAL

To install the updated package, execute the command:

# rpm -Uvh files

You must now update the LIDS configuration by executing the command:

# /usr/sbin/config_lids.pl

To re-enable LIDS (if it was disabled), execute the command:

# /sbin/lidsadm -S -- +LIDS_GLOBAL

To verify the signatures of the updated packages, execute the command:

# rpm -Kv files

These updated packages are for EnGarde Secure Linux Community Edition:

Source Packages:

SRPMS/openssl-0.9.6-1.0.17.src.rpm
MD5 Sum: 5b72a952e2601876afb02fcae0f2f87d

Binary Packages:

i386/openssl-0.9.6-1.0.17.i386.rpm
MD5 Sum: 2be3d62740d8d95469470acb8ad868b3

i386/openssl-misc-0.9.6-1.0.17.i386.rpm
MD5 Sum: 0803e7486e837176ee791d4b26b78ffa

i386/openssl-devel-0.9.6-1.0.17.i386.rpm
MD5 Sum: 61f7354bd49c106f4171bb34da821ac5

i686/openssl-0.9.6-1.0.17.i686.rpm
MD5 Sum: 5500f9acea0513f8d00df85dd432d20e

i686/openssl-misc-0.9.6-1.0.17.i686.rpm
MD5 Sum: 33fb2323346f834a114265e527762f11

i686/openssl-devel-0.9.6-1.0.17.i686.rpm
MD5 Sum: deb6d48417fc34b8b5cabaca3f82a0cf

Vendor URL:  www.openssl.org/news/secadv_20020730.txt (Links to External Site)
Cause:   Boundary error, Exception handling error
Underlying OS:  Linux (EnGarde)

Message History:   This archive entry is a follow-up to the message listed below.
Jul 30 2002 OpenSSL Has Multiple Buffer Overflows That Allow Remote Users to Execute Arbitrary Code with Root Privileges



 Source Message Contents

Subject:  [ESA-20020807-020] ASN.1 vulnerability fix corrections




-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


+------------------------------------------------------------------------+
| EnGarde Secure Linux Security Advisory                  August 7, 2002 |
| http://www.engardelinux.org/                          ESA-20020807-020 |
|                                                                        |
| Packages: openssl, openssl-misc                                        |
| Summary:  ASN.1 vulnerability fix corrections.                         |
+------------------------------------------------------------------------+

  EnGarde Secure Linux is a secure distribution of Linux that features
  improved access control, host and network intrusion detection, Web
  based secure remote management, complete e-commerce using AllCommerce,
  and integrated open source security tools.

OVERVIEW
- --------
  This update adds some fixes from OpenSSL's CVS which corrects the
  implementation of the recent ASN.1 parsing vulnerability fixes.  Please
  refer to ESA-20020730-019 for more information on the vulnerability.

SOLUTION
- --------
  Users of the EnGarde Professional edition can use the Guardian Digital
  Secure Network to update their systems automatically.

  EnGarde Community users should upgrade to the most recent version
  as outlined in this advisory.  Updates may be obtained from:

    ftp://ftp.engardelinux.org/pub/engarde/stable/updates/
    http://ftp.engardelinux.org/pub/engarde/stable/updates/

  Before upgrading the package, the machine must either:

    a) be booted into a "standard" kernel; or
    b) have LIDS disabled.

  To disable LIDS, execute the command:

    # /sbin/lidsadm -S -- -LIDS_GLOBAL

  To install the updated package, execute the command:

    # rpm -Uvh files

  You must now update the LIDS configuration by executing the command:

    # /usr/sbin/config_lids.pl

  To re-enable LIDS (if it was disabled), execute the command:

    # /sbin/lidsadm -S -- +LIDS_GLOBAL

  To verify the signatures of the updated packages, execute the command:

    # rpm -Kv files

UPDATED PACKAGES
- ----------------
  These updated packages are for EnGarde Secure Linux Community
  Edition.

  Source Packages:
    
    SRPMS/openssl-0.9.6-1.0.17.src.rpm
      MD5 Sum: 5b72a952e2601876afb02fcae0f2f87d
  
  Binary Packages:
    
    i386/openssl-0.9.6-1.0.17.i386.rpm
      MD5 Sum: 2be3d62740d8d95469470acb8ad868b3
    
    i386/openssl-misc-0.9.6-1.0.17.i386.rpm
      MD5 Sum: 0803e7486e837176ee791d4b26b78ffa
    
    i386/openssl-devel-0.9.6-1.0.17.i386.rpm
      MD5 Sum: 61f7354bd49c106f4171bb34da821ac5
    
    i686/openssl-0.9.6-1.0.17.i686.rpm
      MD5 Sum: 5500f9acea0513f8d00df85dd432d20e
    
    i686/openssl-misc-0.9.6-1.0.17.i686.rpm
      MD5 Sum: 33fb2323346f834a114265e527762f11
    
    i686/openssl-devel-0.9.6-1.0.17.i686.rpm
      MD5 Sum: deb6d48417fc34b8b5cabaca3f82a0cf

REFERENCES
- ----------
  Guardian Digital's public key:
    http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY

  OpenSSL's Official Web Site:
    http://www.openssl.org/

  Security Contact:   security@guardiandigital.com
  EnGarde Advisories: http://www.engardelinux.org/advisories.html

- --------------------------------------------------------------------------
$Id: ESA-20020807-020-openssl,v 1.2 2002/08/07 20:59:24 rwm Exp $
- --------------------------------------------------------------------------
Author: Ryan W. Maple <ryan@guardiandigital.com> 
Copyright 2002, Guardian Digital, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE9UYpgHD5cqd57fu0RAmKPAJ9L0c9P7Dn98mweLefOgsGA5Km2fgCdGzQZ
5+3tvq+w5nGU2yDl8sYoXdI=
=fNAN
-----END PGP SIGNATURE-----

------------------------------------------------------------------------
     To unsubscribe email engarde-security-request@engardelinux.org
         with "unsubscribe" in the subject of the message.

Copyright(c) 2001 Guardian Digital, Inc.                EnGardeLinux.org
------------------------------------------------------------------------




 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC