SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   OpenSSL Vendors:   OpenSSL.org
(NetBSD Issues Fix) OpenSSL DTLS Processing Bugs Let Remote Users Deny Service and Execute Arbitrary Code
SecurityTracker Alert ID:  1030372
SecurityTracker URL:  http://securitytracker.com/id/1030372
CVE Reference:   CVE-2014-0195, CVE-2014-0221   (Links to External Site)
Date:  Jun 10 2014
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to versions 0.9.8za, 1.0.0m, 1.0.1h
Description:   Two vulnerabilities were reported in OpenSSL. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

A remote user can send specially crafted DTLS fragments to the target DTLS client or server to trigger a buffer overflow and execute arbitrary code on the target system [CVE-2014-0195]. Only applications using OpenSSL as a DTLS client or server are affected.

The vendor was notified on April 23, 2014.

Juri Aedla reported this vulnerability (via HP's ZDI).

A remote server can send a specially crafted DTLS handshake to the target DTLS client to trigger a recursion flaw and cause the target service to crash [CVE-2014-0221]. Only applications using OpenSSL as a DTLS client are affected.

The vendor was notified on May 9, 2014.

Imre Rad (Search-Lab Ltd.) reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can cause the target service to crash.

Solution:   NetBSD has issued a fix.

The NetBSD advisory is available at:

http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2014-006.txt.asc

Vendor URL:  www.openssl.org/news/secadv_20140605.txt (Links to External Site)
Cause:   Boundary error, State error
Underlying OS:  UNIX (NetBSD)
Underlying OS Comments:  5.1, 5.2, 6.0, 6.1

Message History:   This archive entry is a follow-up to the message listed below.
Jun 5 2014 OpenSSL DTLS Processing Bugs Let Remote Users Deny Service and Execute Arbitrary Code



 Source Message Contents

Subject:  NetBSD Security Advisory 2014-006: Multiple OpenSSL vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

		NetBSD Security Advisory 2014-006
		=================================

Topic:		Multiple OpenSSL vulnerabilities


Version:	NetBSD-current:		June 5th, 2014
		NetBSD 6.1 - 6.1.4:	affected
		NetBSD 6.0 - 6.0.5:	affected
		NetBSD 5.1 - 5.1.4:	affected
		NetBSD 5.2 - 5.2.2:	affected

Severity:	MitM, Remote Code Execution, Remote DoS

Fixed:		NetBSD-current:		June 5th, 2014
		NetBSD-6-0 branch:	June 6th, 2014
		NetBSD-6-1 branch:	June 6th, 2014
		NetBSD-6 branch:	June 6th, 2014
		NetBSD-5-2 branch:	June 6th, 2014
		NetBSD-5-1 branch:	June 6th, 2014
		NetBSD-5 branch:	June 6th, 2014

Teeny versions released later than the fix date will contain the fix.

Please note that NetBSD releases prior to 5.1 are no longer supported.
It is recommended that all users upgrade to a supported release.


Abstract
========

SSL/TLS MITM vulnerability (CVE-2014-0224)
DTLS recursion flaw (CVE-2014-0221)
DTLS invalid fragment vulnerability (CVE-2014-0195)
Anonymous ECDH denial of service (CVE-2014-3470)

only in NetBSD-6 and NetBSD-current:
SSL_MODE_RELEASE_BUFFERS NULL pointer dereference (CVE-2014-0198)
SSL_MODE_RELEASE_BUFFERS session injection or denial of service (CVE-2010-5298)

only in NetBSD-5 (previously fixed in NetBSD-6 and NetBSD-current):
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache
Side-channel Attack (CVE-2014-0076)


Technical Details
=================

See http://www.openssl.org/news/secadv_20140605.txt


Solutions and Workarounds
=========================

Update the OpenSSL libraries and make sure the old libssl and libcrypto
are no longer used.

- From source:
- ------------
Update src and rebuild and install.
Note: OpenSSL in NetBSD-6 and NetBSD-current has been updated to
version 1.0.1h; updating the entire src tree is recommended.

- From tarballs:
- --------------
The NetBSD build cluster is currently undergoing hardware maintenance;
it may be a while before builds run again.

To obtain fixed binaries, fetch the appropriate base.tgz and comp.tgz
from a daily build later than the fix dates, from
http://nyftp.netbsd.org/pub/NetBSD-daily/<rel>/<date>/<arch>/binary/sets/
with a date 20140607* or larger, and your release version and architecture
(e.g. http://nyftp.netbsd.org/pub/NetBSD-daily/netbsd-6-1/201406070100Z/amd64/binary/sets/),
and then extract the files:

Shared libraries:

tar xzpf base.tgz \*libssl\* \*libcrypto\*

And static libraries and linker config files:

tar xzpf comp.tgz \*libssl\* \*libcrypto\*

Get the fixed library into use
- ------------------------------
Since the vulnerability is in a shared library, getting the old
library purged and the fixed one into use requires restarting
all programs that load libssl and libcrypto.
The easiest way to do this is to reboot the system.
Another method: using /bin/sh,
ps ax -o pid | (while read pid; do \
	pmap $pid | egrep '(libssl|libcrypto)' && echo found $pid ;\
done)
will find non-chrooted programs that have the affected libraries open;
restart them. sshd will not show up in this list since it runs chrooted
and re-exec'ed but also needs to be restartet.
ldd <programname> will show the shared libraries a programs is wont to use.

Lastly, remove the vulnerable library to make sure it won't get used
accidentially:
rm /usr/lib/libssl.so.10.0

Fixed versions
- --------------
files relative to src/crypto/external/bsd/openssl/dist/ssl

branch      d1_both.c       s3_clnt.c   s3_pkt.c    s3_srvr.c    ssl3.h
- ----------  --------------- ----------- ----------- ------------ ----------
netbsd-6-0  1.1.1.4.4.1.4.2 1.4.4.1.4.2 1.9.4.1.4.2 1.10.2.1.4.2 1.2.2.1.4.2
netbsd-6-1  1.1.1.4.4.1.6.2 1.4.4.1.6.2 1.9.4.1.6.2 1.10.2.1.6.2 1.2.2.1.6.2
netbsd-6    1.1.1.4.4.3     1.4.4.3     1.9.4.3     1.10.2.3     1.2.2.3
HEAD        1.1.1.8         1.9         1.16        1.16         1.6

files relative to crypto/dist/openssl/ssl

branch      d1_both.c    s3_clnt.c     s3_pkt.c     s3_srvr.c     ssl3.h
- ----------  -----------  ------------  -----------  ------------  --------
netbsd-5-1  1.3.4.2.2.1  1.12.4.2.2.2  1.9.4.3.2.1  1.15.4.3.2.2  1.8.12.1
netbsd-5-2  1.3.4.2.6.1  1.12.4.3.4.1  1.9.4.3.6.1  1.15.4.4.4.1  1.8.2.1
netbsd-5    1.3.4.3      1.12.4.4      1.9.4.4      1.15.4.5      1.8.4.1

files relative to crypto/dist/openssl/crypto

branch      bn/bn.h    bn/bn_lib.c  ec/ec2_mult.c
- ----------  ---------  -----------  -------------
netbsd-5-1  1.12.12.1  1.7.12.1     1.1.1.2.12.1
netbsd-5-2  1.12.2.1   1.7.2.1      1.1.1.2.2.1
netbsd-5    1.12.4.1   1.7.4.1      1.1.1.2.4.1


Thanks To
=========

The OpenSSL team acknowledges:
KIKUCHI Masashi (Lepidum Co. Ltd.) for CVE-2014-0224
Imre Rad (Search-Lab Ltd.) for CVE-2014-0221
Jüri Aedla for CVE-2014-0195
Felix Gröbert and Ivan Fratrić at Google for CVE-2014-3470
Yuval Yarom and Naomi Benger for CVE-2014-0076
for discovering the vulnerabilities, and
Stephen Henson and Matt Caswell of OpenSSL and KIKUCHI Masashi
for developing fixes.


Revision History
================

	2014-06-09	Initial release


More Information
================

Advisories may be updated as new information becomes available.
The most recent version of this advisory (PGP signed) can be found at 
  http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2014-006.txt.asc

Information about NetBSD and NetBSD security can be found at
http://www.NetBSD.org/ and http://www.NetBSD.org/Security/ .


Copyright 2014, The NetBSD Foundation, Inc.  All Rights Reserved.
Redistribution permitted only in full, unmodified form.

$NetBSD: NetBSD-SA2014-006.txt,v 1.1 2014/06/09 19:22:28 tonnerre Exp $

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=0t7m
-----END PGP SIGNATURE-----
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC