SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   VMware Vendors:   VMware
(VMware Issues Fix) OpenSSL SSL/TLS Handshade Flaws May Let Remote Users Crash OpenSSL-based Applications
SecurityTracker Alert ID:  1010096
SecurityTracker URL:  http://securitytracker.com/id/1010096
CVE Reference:   CVE-2004-0079, CVE-2004-0081, CVE-2004-0112   (Links to External Site)
Date:  May 8 2004
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): VMware ESX Server 2.0.1
Description:   Some vulnerabilities were reported in OpenSSL, primarily involving the processing of SSL/TLS protocol handshakes. A remote user can cause OpenSSL to crash. VMware ESX Server is affected.

It is reported that there is a null-pointer assignment in the do_change_cipher_spec() function [CVE: CVE-2004-0079]. A remote user can perform a specially crafted SSL/TLS handshake with a target server to cause OpenSSL to crash on the target system. This may cause the application using OpenSSL to crash.

All versions of OpenSSL from 0.9.6c to 0.9.6k inclusive and from 0.9.7a to 0.9.7c inclusive are reportedly vulnerable to this null-pointer bug.

It is also reported that there is a flaw in performing SSL/TLS handshakes using Kerberos ciphersuites [CVE: CVE-2004-0112]. A remote user can perform a specially crafted SSL/TLS handshake against a server that is using Kerberos ciphersuites to cause OpenSSL to crash on the target system.

OpenSSL versions 0.9.7a, 0.9.7b, and 0.9.7c are reported to be vulnerable to this Kerberos handshake bug.

It is also reported that a remote user may be able to cause OpenSSL to enter an infinite loop due to a flaw in a patch introduced in 0.9.6d [CVE: CVE-2004-0081].

The vendor credits Dr. Stephen Henson of the OpenSSL core team as well as Codenomicon for supplying their TLS Test Tool and Joe Orton of Red Hat for performing the majority of the testing.

Impact:   A remote user can cause OpenSSL to crash, which may cause an application using OpenSSL to crash. The specific impact depends on the application that uses the OpenSSL library.
Solution:   VMware has issued a fix:

OpenSSL Update for ESX Server 2.0.1, Build 8045:

http://vmware-svca.www.conxion.com/secured/esx/esx-201-patch-8045.tgz

The update is only for ESX Server 2.0.1, Build 6403. Users of ESX 2.0 must upgrade to ESX 2.0.1 before applying this update.

This update supercedes the OpenSSH and OpenSSL Update for ESX Server 2.0.0.

Vendor URL:  www.vmware.com/download/esx/esx201-8045update.html (Links to External Site)
Cause:   Boundary error, Exception handling error, State error

Message History:   This archive entry is a follow-up to the message listed below.
Mar 17 2004 OpenSSL SSL/TLS Handshade Flaws May Let Remote Users Crash OpenSSL-based Applications



 Source Message Contents

Subject:  http://www.vmware.com/download/esx/esx201-8045update.html


http://www.vmware.com/download/esx/esx201-8045update.html

 > VMware ESX Server 2.0.1 Security Update for OpenSSL
 >
 > Last updated: 5/4/2004

CVE: CAN-2004-0079, CAN-2004-0081, CAN-2004-0112

OpenSSL Update for ESX Server 2.0.1, Build 8045:

http://vmware-svca.www.conxion.com/secured/esx/esx-201-patch-8045.tgz

The update is only for ESX Server 2.0.1, Build 6403. Users of ESX 2.0 must upgrade to ESX 
2.0.1 before applying this update.

This update supercedes the OpenSSH and OpenSSL Update for ESX Server 2.0.0.

A separate OpenSSL update for ESX Server 1.5.2 is available.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC