SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   OpenSSL Vendors:   OpenSSL.org
(HP Issues Fix for OpenVMS) OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny Service
SecurityTracker Alert ID:  1028343
SecurityTracker URL:  http://securitytracker.com/id/1028343
CVE Reference:   CVE-2012-2333   (Links to External Site)
Date:  Mar 26 2013
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to versions 0.9.8x, 1.0.0j, 1.0.1c
Description:   A vulnerability was reported in OpenSSL. A remote user can cause denial of service conditions.

A remote user can send specially crafted TLS/DTLS records to cause denial of service conditions.

The CBC mode ciphersuites in TLS 1.1, 1.2 and DTLS are affected

Both clients and servers are affected.

DTLS is affected in all versions of OpenSSL.

TLS is affected in OpenSSL version 1.0.1 and later.

Codenomicon reported this vulnerability.

Impact:   A remote user can cause denial of service conditions.
Solution:   HP has issued a fix for OpenVMS (HP SSL v1.4-467).

The HP advisory is available at:

http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03701301-1

Vendor URL:  www.openssl.org/news/secadv_20120510.txt (Links to External Site)
Cause:   Input validation error, State error
Underlying OS:  OpenVMS
Underlying OS Comments:  OpenVMS Alpha and Integrity

Message History:   This archive entry is a follow-up to the message listed below.
May 11 2012 OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC