SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   OpenSSL Vendors:   OpenSSL.org
(NetBSD Issues Fix) OpenSSL asn1_d2i_read_bio() Buffer Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1027135
SecurityTracker URL:  http://securitytracker.com/id/1027135
CVE Reference:   CVE-2012-2110   (Links to External Site)
Date:  Jun 8 2012
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 0.9.8w and 1.0.0i
Description:   A vulnerability was reported in OpenSSL. A remote user can execute arbitrary code on the target system.

A remote user can send specially crafted data to the target application using OpenSSL to potentially trigger a heap overflow in the asn1_d2i_read_bio() function and execute arbitrary code on the target system. The code will run with the privileges of the target application.

Applications that use ASN.1 BIO or FILE based functions to read untrusted DER format data are affected. The d2i_*_bio and d2i_*_fp type of functions are affected.

Applications that use the memory based ASN1 functions (e.g., d2i_X509, d2i_PKCS12 etc) are not affected.

The SSL/TLS code is not affected.

Applications using only the PEM routines are not affected.

S/MIME and CMS applications that use the built-in MIME parser SMIME_read_PKCS7 and SMIME_read_CMS functions are affected.

Tavis Ormandy, Google Security Team, reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   NetBSD has issued a fix for CVE-2012-2110.

The NetBSD advisory is available at:

http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2012-001.txt.asc

Vendor URL:  www.openssl.org/news/secadv_20120424.txt (Links to External Site)
Cause:   Boundary error
Underlying OS:  UNIX (NetBSD)
Underlying OS Comments:  4.0, 5.0, 5.1

Message History:   This archive entry is a follow-up to the message listed below.
Apr 20 2012 OpenSSL asn1_d2i_read_bio() Buffer Overflow Lets Remote Users Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC