SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Juniper SBR Vendors:   Juniper
(Juniper Issues Fix for Juniper Steel-Belted Radius) OpenSSL asn1_d2i_read_bio() Buffer Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1028993
SecurityTracker URL:  http://securitytracker.com/id/1028993
CVE Reference:   CVE-2012-2110   (Links to External Site)
Date:  Sep 9 2013
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 6.17
Description:   A vulnerability was reported in OpenSSL. A remote user can execute arbitrary code on the target system. Juniper Steel-Belted Radius is affected.

A remote user can send specially crafted data to the target application using OpenSSL to potentially trigger a heap overflow in the asn1_d2i_read_bio() function and execute arbitrary code on the target system. The code will run with the privileges of the target application.

Applications that use ASN.1 BIO or FILE based functions to read untrusted DER format data are affected. The d2i_*_bio and d2i_*_fp type of functions are affected.

Applications that use the memory based ASN1 functions (e.g., d2i_X509, d2i_PKCS12 etc) are not affected.

The SSL/TLS code is not affected.

Applications using only the PEM routines are not affected.

S/MIME and CMS applications that use the built-in MIME parser SMIME_read_PKCS7 and SMIME_read_CMS functions are affected.

Tavis Ormandy, Google Security Team, reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   Juniper has issued a fix for CVE-2012-2110 for Juniper Steel-Belted Radius (SBR Enterprise, SBR Global Enterprise: 6.17; SBR Carrier: Fixes are available for 7.3.1, 7.4.1, 7.5.0 through regular JTAC support channels).

The Juniper advisory is available at:

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10569

Cause:   Boundary error

Message History:   This archive entry is a follow-up to the message listed below.
Apr 20 2012 OpenSSL asn1_d2i_read_bio() Buffer Overflow Lets Remote Users Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC