SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Splunk Vendors:   Splunk Inc.
(Splunk Issues Fix for Splunk Enterprise) OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code
SecurityTracker Alert ID:  1030735
SecurityTracker URL:  http://securitytracker.com/id/1030735
CVE Reference:   CVE-2014-3511   (Links to External Site)
Updated:  Oct 10 2014
Original Entry Date:  Aug 15 2014
Impact:   Denial of service via network, Disclosure of system information, Execution of arbitrary code via network, Modification of system information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Splunk Enterprise 5.0.* prior to 5.0.10, 6.0.* prior to 6.0.6; 6.1.* prior to 6.1.4
Description:   Several vulnerabilities were reported in OpenSSL. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information. Splunk Enterprise is affected by one vulnerability.

Applications using OpenSSL that print may leak some stack contents to the application [CVE-2014-3508]. The OpenSSL client and server are not affected. Ivan Fratric (Google) reported this vulnerability on June 19, 2014.


A remote server can send a specially crafted ec point format extension to the target multithreaded client via a resumed session to trigger a race condition in ssl_parse_serverhello_tlsext and write to freed memory [CVE-2014-3509]. Version 1.0.0 and 1.0.1 clients are affected. Gabor Tyukasz (LogMeIn Inc) reported this vulnerability on July 8, 2014.

A remote user can send specially crafted DTLS packets to trigger a double free memory error and deny service on the target system [CVE-2014-3505]. Adam Langley and Wan-Teh Chang (Google) reported this vulnerability on June 6, 2014.

A remote user can send specially crafted data to trigger a DTLS handshake processing flaw and consume excessive memory resources on the target system [CVE-2014-3506]. Adam Langley (Google) reported this vulnerability on June 6, 2014.

A remote user can send specially crafted zero-length DTLS fragments to trigger a memory leak [CVE-2014-3507]. Adam Langley (Google) reported this vulnerability on June 6, 2014.

A remote server can specify an anonymous EC(DH) ciphersuite to trigger a null pointer dereference in the target DTLS client and cause the client to crash [CVE-2014-3510]. Felix Grobert (Google) reported this vulnerability on July 18, 2014.

A remote user in a privileged network position can cause a target user's ClientHello message to be fragmented to trigger a flaw in the server code and force a downgrade to TLS 1.0 [CVE-2014-3511]. Version 1.0.1 is affected. David Benjamin and Adam Langley (Google) reported this vulnerability on July 21, 2014.

A remote user can send specially crafted SRP data to trigger a buffer overflow and potentially execute arbitrary code on the target system [CVE-2014-3512]. Version 1.0.1 is affected. Sean Devlin and Watson Ladd (Cryptography Services, NCC
Group) reported this vulnerability on July 31, 2014.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can cause denial of service conditions.

A user can obtain potentially sensitive information from the stack.

Solution:   Splunk has issued a fix for CVE-2014-3511 for Splunk Enterprise (5.0.10, 6.0.6, 6.1.4).

The Splunk advisories are available at:

http://www.splunk.com/view/SP-CAAANE2
http://www.splunk.com/view/SP-CAAANHS

Vendor URL:  www.openssl.org/news/secadv_20140806.txt (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, Resource error, State error
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (FreeBSD), UNIX (HP/UX), UNIX (macOS/OS X), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Aug 7 2014 OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC