SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   OpenSSL Vendors:   OpenSSL.org
(Gentoo Issues Fix) OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code
SecurityTracker Alert ID:  1026762
SecurityTracker URL:  http://securitytracker.com/id/1026762
CVE Reference:   CVE-2011-4108, CVE-2011-4109, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2012-0027, CVE-2012-0390   (Links to External Site)
Date:  Mar 6 2012
Impact:   Denial of service via network, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 0.9.8s; 1.x prior to 1.0.0f
Description:   Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the target system.

A remote user can conduct an efficient plaintext recovery attack against the OpenSSL implementation of Datagram Transport Layer Security (DTLS) [CVE-2011-4108, CVE-2012-0390]. Nadhem Alfardan and Kenny Paterson of the Information Security Group at Royal Holloway, University of London (www.isg.rhul.ac.uk) reported this vulnerability.

A remote user can trigger a double-free memory error when a policy check fails [CVE-2011-4109]. Version 0.9.8 systems with the X509_V_FLAG_POLICY_CHECK set are affected. Ben Laurie reported this vulnerability.

The bytes used as block cipher padding in SSL 3.0 records are not cleared. A remote user may be able to conduct a SSL 3.0 handshake to obtain memory contents [CVE-2011-4576]. Adam Langley reported this vulnerability.

Specially crafted RFC 3779 data within a certificate may cause an assertion failure [CVE-2011-4577]. System builds configured with "enable-rfc3779" are affected. Andrew Chi, BBN Technologies, reported this vulnerability.

A remote user can exploit a flaw in handshake restarts for server gated cryptography (SGC) to cause denial of service conditions on the target system [CVE-2011-4619]. Adam Langley reported this vulnerability.

A remote user can send specially crafted GOST parameters to cause the target server to crash [CVE-2012-0027]. OpenSSL GOST ENGINE users are affected. Andrey Kulikov reported this vulnerability.

Impact:   A remote user may be able to execute arbitrary code on the target system.

A remote user can cause the target server to crash.

A remote user can obtain plaintext in certain cases.

Solution:   Gentoo has issued a fix.

The Gentoo advisory is available at:

http://security.gentoo.org/glsa/glsa-201203-12.xml

Vendor URL:  openssl.org/news/secadv_20120104.txt (Links to External Site)
Cause:   Access control error, Exception handling error, Input validation error, State error
Underlying OS:  Linux (Gentoo)

Message History:   This archive entry is a follow-up to the message listed below.
Jan 5 2012 OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC