SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   OpenSSL Vendors:   OpenSSL.org
(Trustix Issues Revised Fix) OpenSSL Has Multiple Buffer Overflows That Allow Remote Users to Execute Arbitrary Code with Root Privileges
SecurityTracker Alert ID:  1005059
SecurityTracker URL:  http://securitytracker.com/id/1005059
CVE Reference:   CVE-2002-0655, CVE-2002-0656, CVE-2002-0657, CVE-2002-0659   (Links to External Site)
Date:  Aug 15 2002
Impact:   Denial of service via network, Execution of arbitrary code via network, Root access via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 0.9.6d or earlier, 0.9.7-beta2 or earlier, 0.9.7 current development snapshots
Description:   Four buffer overflow conditions were reported in OpenSSL. All four may allow a remote user to execute arbitrary code.

The vendor has reported that A.L. Digital Ltd and The Bunker have uncovered multiple buffer overflows in OpenSSL, discovered during a security review.

A remote user could create a specially crafted, oversized client master key and use SSL2 to trigger an overflow on an SSL server. According to the report, this vulnerability was independently discovered by Neohapsis, which has confirmed that the overflow can be exploited to execute arbitrary code.

A remote user with an SSL server could create a specially crafted, oversized session ID and supply this ID to a target client using SSL3 to trigger an overflow.

A remote user could supply a specially crafted, oversized master key to an SSL3 server to trigger an overflow. It is reported that this flaw affects OpenSSL 0.9.7 prior to version 0.9.7-beta3 when Kerberos is enabled.

Several buffers used for ASCII representations of integers are reportedly too small on 64 bit platforms.

The report also states that other potential buffer overflows that are currently considered to be non-exploitable have been discovered.

The vendor notes that Adi Stav and James Yonan independently reported that the ASN1 parser can be confused by certain invalid encodings, potentially allowing a remote user to cause denial of service conditions. An OpenSSL-based application that use the ASN1 library to parse untrusted data (including all SSL or TLS applications using S/MIME [PKCS#7] or certificate generation routines) are affected.

Impact:   A remote user acting as an SSL client could execute arbitrary code on an SSL server. A remote user acting as an SSL server could cause arbitrary code to be executed on an SSL client that is connecting to the server. In each case, the code would run with privileges of the affected implementation.

A remote user may be able cause denial of service conditions.

Solution:   Trustix has released a revised fix that fixes a typo in the previous patch:

<URI:http://www.trustix.net/pub/Trustix/updates/>
<URI:ftp://ftp.trustix.net/pub/Trustix/updates/>

Users of the SWUP tool can enjoy having updates automatically installed using 'swup --upgrade'.

The MD5sums of the packages are:

1b40da9fcf2a08375c4fd51d4b6f5e65 ./1.5/SRPMS/openssl-0.9.6-11tr.src.rpm
c87cc10633b83b712bb25083096fc9ce ./1.5/RPMS/openssl-support-0.9.6-11tr.i586.rpm
fd0f30aedae652c71ea5d94130ef43ed ./1.5/RPMS/openssl-python-0.9.6-11tr.i586.rpm
d7c58b1f6d94a80f35be0e17b51eb361 ./1.5/RPMS/openssl-devel-0.9.6-11tr.i586.rpm
4bc2739b06f88c703e904b9d504b4754 ./1.5/RPMS/openssl-0.9.6-11tr.i586.rpm
1b40da9fcf2a08375c4fd51d4b6f5e65 ./1.2/SRPMS/openssl-0.9.6-11tr.src.rpm
a81245b2f4f3f5832bc3618edb972055 ./1.2/RPMS/openssl-support-0.9.6-11tr.i586.rpm
445962650cb3a703c5801e9433041b03 ./1.2/RPMS/openssl-python-0.9.6-11tr.i586.rpm
b60031785bc049ef3d32c849d0864000 ./1.2/RPMS/openssl-devel-0.9.6-11tr.i586.rpm
cce8b981b160eaeb4c87a744a2d14aa0 ./1.2/RPMS/openssl-0.9.6-11tr.i586.rpm
1b40da9fcf2a08375c4fd51d4b6f5e65 ./1.1/SRPMS/openssl-0.9.6-11tr.src.rpm
5aed3162d93f8f26161949b6b7eca53c ./1.1/RPMS/openssl-support-0.9.6-11tr.i586.rpm
98012192550de002d1675aeeaf258b48 ./1.1/RPMS/openssl-python-0.9.6-11tr.i586.rpm
03c6d7f1dddc3d369c31ea7d4d670758 ./1.1/RPMS/openssl-devel-0.9.6-11tr.i586.rpm
f47190c63a0232f38e502a185f816e91 ./1.1/RPMS/openssl-0.9.6-11tr.i586.rpm

Vendor URL:  www.openssl.org/news/secadv_20020730.txt (Links to External Site)
Cause:   Boundary error, Exception handling error
Underlying OS:  Linux (Trustix)
Underlying OS Comments:  1.1, 1.2, 1.5

Message History:   This archive entry is a follow-up to the message listed below.
Jul 30 2002 OpenSSL Has Multiple Buffer Overflows That Allow Remote Users to Execute Arbitrary Code with Root Privileges



 Source Message Contents

Subject:  TSL-2002-0066 - openssl


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Bugfix Advisory #2002-0066

Package name:      openssl
Summary:           Minor bugfix
Date:              2002-08-13
Affected versions: TSL 1.1, 1.2, 1.5

- --------------------------------------------------------------------------

Problem description:
  Fixed a typo in the previous patch.


Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All TSL updates are available from
  <URI:http://www.trustix.net/pub/Trustix/updates/>
  <URI:ftp://ftp.trustix.net/pub/Trustix/updates/>


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.

  Get SWUP from:
  <URI:ftp://ftp.trustix.net/pub/Trustix/software/swup/>


Public testing:
  These packages have been available for public testing for some time.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at
  <URI:http://www.trustix.net/pub/Trustix/testing/>
  <URI:ftp://ftp.trustix.net/pub/Trustix/testing/>
  

Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.net/support/>


Verification:
  This advisory along with all TSL packages are signed with the TSL sign key.
  This key is available from:
  <URI:http://www.trustix.net/TSL-GPG-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.net/errata/trustix-1.2/> and
  <URI:http://www.trustix.net/errata/trustix-1.5/>
  or directly at
  <URI:http://www.trustix.net/errata/misc/2002/TSL-2002-0066-openssl.asc.txt>


MD5sums of the packages:
- --------------------------------------------------------------------------
1b40da9fcf2a08375c4fd51d4b6f5e65  ./1.5/SRPMS/openssl-0.9.6-11tr.src.rpm
c87cc10633b83b712bb25083096fc9ce  ./1.5/RPMS/openssl-support-0.9.6-11tr.i586.rpm
fd0f30aedae652c71ea5d94130ef43ed  ./1.5/RPMS/openssl-python-0.9.6-11tr.i586.rpm
d7c58b1f6d94a80f35be0e17b51eb361  ./1.5/RPMS/openssl-devel-0.9.6-11tr.i586.rpm
4bc2739b06f88c703e904b9d504b4754  ./1.5/RPMS/openssl-0.9.6-11tr.i586.rpm
1b40da9fcf2a08375c4fd51d4b6f5e65  ./1.2/SRPMS/openssl-0.9.6-11tr.src.rpm
a81245b2f4f3f5832bc3618edb972055  ./1.2/RPMS/openssl-support-0.9.6-11tr.i586.rpm
445962650cb3a703c5801e9433041b03  ./1.2/RPMS/openssl-python-0.9.6-11tr.i586.rpm
b60031785bc049ef3d32c849d0864000  ./1.2/RPMS/openssl-devel-0.9.6-11tr.i586.rpm
cce8b981b160eaeb4c87a744a2d14aa0  ./1.2/RPMS/openssl-0.9.6-11tr.i586.rpm
1b40da9fcf2a08375c4fd51d4b6f5e65  ./1.1/SRPMS/openssl-0.9.6-11tr.src.rpm
5aed3162d93f8f26161949b6b7eca53c  ./1.1/RPMS/openssl-support-0.9.6-11tr.i586.rpm
98012192550de002d1675aeeaf258b48  ./1.1/RPMS/openssl-python-0.9.6-11tr.i586.rpm
03c6d7f1dddc3d369c31ea7d4d670758  ./1.1/RPMS/openssl-devel-0.9.6-11tr.i586.rpm
f47190c63a0232f38e502a185f816e91  ./1.1/RPMS/openssl-0.9.6-11tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE9Wh4UwRTcg4BxxS0RAkuvAJ44rKlVOMlZXlKCm2iwNb7HotC6ygCcCKRi
skbdgiU/dmSng24/i99EO3k=
=i15X
-----END PGP SIGNATURE-----

_______________________________________________
tsl-announce mailing list
tsl-announce@trustix.org
http://www.trustix.org/mailman/listinfo.cgi/tsl-announce


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC