SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   OpenSSL Vendors:   OpenSSL.org
(Fedora Issues Fix) OpenSSL SSL/TLS Handshade Flaws May Let Remote Users Crash OpenSSL-based Applications
SecurityTracker Alert ID:  1009527
SecurityTracker URL:  http://securitytracker.com/id/1009527
CVE Reference:   CVE-2004-0079, CVE-2004-0081   (Links to External Site)
Date:  Mar 23 2004
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 0.9.6c - 0.9.6k and 0.9.7a - 0.9.7c
Description:   Some vulnerabilities were reported in OpenSSL, primarily involving the processing of SSL/TLS protocol handshakes. A remote user can cause OpenSSL to crash.

It is reported that there is a null-pointer assignment in the do_change_cipher_spec() function [CVE: CVE-2004-0079]. A remote user can perform a specially crafted SSL/TLS handshake with a target server to cause OpenSSL to crash on the target system. This may cause the application using OpenSSL to crash.

All versions of OpenSSL from 0.9.6c to 0.9.6k inclusive and from 0.9.7a to 0.9.7c inclusive are reportedly vulnerable to this null-pointer bug.

It is also reported that there is a flaw in performing SSL/TLS handshakes using Kerberos ciphersuites [CVE: CVE-2004-0112]. A remote user can perform a specially crafted SSL/TLS handshake against a server that is using Kerberos ciphersuites to cause OpenSSL to crash on the target system.

OpenSSL versions 0.9.7a, 0.9.7b, and 0.9.7c are reported to be vulnerable to this Kerberos handshake bug.

It is also reported that a remote user may be able to cause OpenSSL to enter an infinite loop due to a flaw in a patch introduced in 0.9.6d [CVE: CVE-2004-0081].

The vendor credits Dr. Stephen Henson of the OpenSSL core team as well as Codenomicon for supplying their TLS Test Tool and Joe Orton of Red Hat for performing the majority of the testing.

Impact:   A remote user can cause OpenSSL to crash, which may cause an application using OpenSSL to crash. The specific impact depends on the application that uses the OpenSSL library.
Solution:   Fedora has released a fix, available at:

http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

e8bdb97523942f9ffaa2266557522cb4 SRPMS/openssl-0.9.7a-33.10.src.rpm
e8b8fa33866d3bfb18a0bb363b7da157 i386/openssl-0.9.7a-33.10.i386.rpm
185ce2fa3dcc7eefd08755fbf32ba4b9 i386/openssl-devel-0.9.7a-33.10.i386.rpm
dffeec7a90d6d455d42f4150f8d87234 i386/openssl-perl-0.9.7a-33.10.i386.rpm
910b24732d051afceda9f9c725b26eaf i386/debug/openssl-debuginfo-0.9.7a-33.10.i386.rpm
f2c1ee5973157103d6699fb8122a42cd i386/openssl-0.9.7a-33.10.i686.rpm
aae58c51061b47c4886249787a6b0d12 i386/debug/openssl-debuginfo-0.9.7a-33.10.i686.rpm
ef901bfd90760a5a9bfe04964fc1edaf x86_64/openssl-0.9.7a-33.10.x86_64.rpm
0efb65591070daa52274aeba71c27c25 x86_64/openssl-devel-0.9.7a-33.10.x86_64.rpm
6c37c57523dafe0125ea7cafd9d03bd1 x86_64/openssl-perl-0.9.7a-33.10.x86_64.rpm
e3fa109733cd72647c96cd02a2c92628 x86_64/debug/openssl-debuginfo-0.9.7a-33.10.x86_64.rpm

bfa1844b85a37b4985bc05078c34dc5a SRPMS/openssl096-0.9.6-26.src.rpm
a138ec3378572805b3607f0e55eb081a i386/openssl096-0.9.6-26.i386.rpm
810ef6df3fcc5762b3b69654f9f1e145 i386/debug/openssl096-debuginfo-0.9.6-26.i386.rpm
b54014864a487e940b0a433755e75893 x86_64/openssl096-0.9.6-26.x86_64.rpm
12c3ebe731dc15263ae8e980173c3f9f x86_64/debug/openssl096-debuginfo-0.9.6-26.x86_64.rpm

216c598e2d8ded8f24f1c3b828051743 SRPMS/openssl096b-0.9.6b-18.src.rpm
5db375e1acdaf84a33ccab3f9f48b171 i386/openssl096b-0.9.6b-18.i386.rpm
b904fa03ff1b6ad06a488e3388b74a58 i386/debug/openssl096b-debuginfo-0.9.6b-18.i386.rpm
d2f6313c15f893b15230a82bc9ca5c5e x86_64/openssl096b-0.9.6b-18.x86_64.rpm
25804bd47caad8bb6a6d74f46c36cf62 x86_64/debug/openssl096b-debuginfo-0.9.6b-18.x86_64.rpm

Vendor URL:  www.openssl.org/news/secadv_20040317.txt (Links to External Site)
Cause:   Boundary error, Exception handling error, State error
Underlying OS:  Linux (Red Hat Fedora)
Underlying OS Comments:  Fedora Core 1

Message History:   This archive entry is a follow-up to the message listed below.
Mar 17 2004 OpenSSL SSL/TLS Handshade Flaws May Let Remote Users Crash OpenSSL-based Applications



 Source Message Contents

Subject:  [SECURITY] Fedora Core 1 Update: openssl-0.9.7a-33.10


---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2004-095
2004-03-19
---------------------------------------------------------------------

Name        : openssl
Version     : 0.9.7a                      
Release     : 33.10                  
Summary     : The OpenSSL toolkit.
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.

---------------------------------------------------------------------
Update Information:

This update includes OpenSSL packages to fix two security issues
affecting OpenSSL 0.9.7a which allow denial of service attacks; CVE
CAN-2004-0079 and CVE CAN-2003-0851.

Also included are updates for the OpenSSL 0.9.6 and 0.9.6b
compatibility libraries included in Fedora Core 1, fixing a separate
issue which could also lead to a denial of service attack; CVE
CAN-2004-0081.

---------------------------------------------------------------------
This update can be downloaded from:
  http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

e8bdb97523942f9ffaa2266557522cb4  SRPMS/openssl-0.9.7a-33.10.src.rpm
e8b8fa33866d3bfb18a0bb363b7da157  i386/openssl-0.9.7a-33.10.i386.rpm
185ce2fa3dcc7eefd08755fbf32ba4b9  i386/openssl-devel-0.9.7a-33.10.i386.rpm
dffeec7a90d6d455d42f4150f8d87234  i386/openssl-perl-0.9.7a-33.10.i386.rpm
910b24732d051afceda9f9c725b26eaf  i386/debug/openssl-debuginfo-0.9.7a-33.10.i386.rpm
f2c1ee5973157103d6699fb8122a42cd  i386/openssl-0.9.7a-33.10.i686.rpm
aae58c51061b47c4886249787a6b0d12  i386/debug/openssl-debuginfo-0.9.7a-33.10.i686.rpm
ef901bfd90760a5a9bfe04964fc1edaf  x86_64/openssl-0.9.7a-33.10.x86_64.rpm
0efb65591070daa52274aeba71c27c25  x86_64/openssl-devel-0.9.7a-33.10.x86_64.rpm
6c37c57523dafe0125ea7cafd9d03bd1  x86_64/openssl-perl-0.9.7a-33.10.x86_64.rpm
e3fa109733cd72647c96cd02a2c92628  x86_64/debug/openssl-debuginfo-0.9.7a-33.10.x86_64.rpm

bfa1844b85a37b4985bc05078c34dc5a  SRPMS/openssl096-0.9.6-26.src.rpm
a138ec3378572805b3607f0e55eb081a  i386/openssl096-0.9.6-26.i386.rpm
810ef6df3fcc5762b3b69654f9f1e145  i386/debug/openssl096-debuginfo-0.9.6-26.i386.rpm
b54014864a487e940b0a433755e75893  x86_64/openssl096-0.9.6-26.x86_64.rpm
12c3ebe731dc15263ae8e980173c3f9f  x86_64/debug/openssl096-debuginfo-0.9.6-26.x86_64.rpm

216c598e2d8ded8f24f1c3b828051743  SRPMS/openssl096b-0.9.6b-18.src.rpm
5db375e1acdaf84a33ccab3f9f48b171  i386/openssl096b-0.9.6b-18.i386.rpm
b904fa03ff1b6ad06a488e3388b74a58  i386/debug/openssl096b-debuginfo-0.9.6b-18.i386.rpm
d2f6313c15f893b15230a82bc9ca5c5e  x86_64/openssl096b-0.9.6b-18.x86_64.rpm
25804bd47caad8bb6a6d74f46c36cf62  x86_64/debug/openssl096b-debuginfo-0.9.6b-18.x86_64.rpm

This update can also be installed with the Update Agent; you can
launch the Update Agent with the 'up2date' command.  
---------------------------------------------------------------------


--
fedora-announce-list mailing list
fedora-announce-list@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-announce-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC