SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   OpenSSL Vendors:   OpenSSL.org
(CentOS Issues Fix) OpenSSL Multiple Bugs Let Remote Users Deny Service and Obtain Potentially Sensitive Information
SecurityTracker Alert ID:  1034499
SecurityTracker URL:  http://securitytracker.com/id/1034499
CVE Reference:   CVE-2015-3195   (Links to External Site)
Date:  Dec 18 2015
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to versions 0.9.8zh, 1.0.0t, 1.0.1q, 1.0.2e
Description:   Multiple vulnerabilities were reported in OpenSSL. A remote user can cause the target service to crash. A remote user can obtain potentially sensitive information on the target system.

A remote server can send a specially crafted ServerKeyExchange for an anonymous DH ciphersuite with the value of p set to 0 to potentially cause the target service to crash [CVE-2015-1794]. Version 1.0.2 is affected.

The vendor was notified on August 3, 2015.

Guy Leaver (Cisco) reported this vulnerability.

A remote user can exploit a carry propagation flaw in BN_mod_exp() to potentially determine information about the private key in certain situations [CVE-2015-3193].

Systems configured for persistent DH parameters and sharing a private key between multiple clients are affected. Version 1.0.2 is affected.

The vendor was notified on August 13, 2015.

Hanno Bock reported this vulnerability.

A remote user can send a certificate with a specially crafted ASN.1 signature that uses the RSA PSS algorithm and does not contain the mast generation function parameter to trigger a null pointer dereference and crash [CVE-2015-3194]. Versions 1.0.1 and 1.0.2 are affected.

The vendor was notified on August 27 2015.

Loic Jonas Etienne (Qnective AG) reported this vulnerability.

A remote user can supply a specially crafted X509_ATTRIBUTE structure to trigger a memory leak and potentially disclose sensitive information [CVE-2015-3195]. Applications that read PKCS#7 or CMS data from untrusted sources are affected. SSL/TLS is not affected.

The vendor was notified on November 9, 2015.

Adam Langley (Google/BoringSSL) reported this vulnerability.

A remote user can send send PSK identity hints to a multi-threaded client to trigger a race condition and then a double free memory error and cause the target service to crash [CVE-2015-3196]. Versions 1.0.0, 1.0.1 (prior to 1.0.1p), and 1.0.2 (prior to 1.0.2d) are affected.

Impact:   A remote user can cause the target service to crash.

A remote user can obtain potentially sensitive information on the target system.

Solution:   CentOS has issued a fix for CVE-2015-3195.

i386:
5a0e271012e83b468543bde0489d3bd192c9c903c5d859eaf1fbd7ec780c9d18 openssl-0.9.8e-37.el5_11.i386.rpm
6e18eb8abab97d5895cc871bb917e0bcef0390bfe564eda080efe5f310cb89a1 openssl-0.9.8e-37.el5_11.i686.rpm
201760f2b2e51d07abefeb8e4c0d88c9b0af7cb3fb4ec542e5e78797ceab0b6a openssl-devel-0.9.8e-37.el5_11.i386.rpm
416df04d51c22373b9de55e0fe6afba549ae91eccb45d914828a6190f19fb66c openssl-perl-0.9.8e-37.el5_11.i386.rpm

x86_64:
6e18eb8abab97d5895cc871bb917e0bcef0390bfe564eda080efe5f310cb89a1 openssl-0.9.8e-37.el5_11.i686.rpm
3fa25d9b5735ecd4d9b86b80fca104967d700e193e60f87dc6b2ba70a1b48980 openssl-0.9.8e-37.el5_11.x86_64.rpm
201760f2b2e51d07abefeb8e4c0d88c9b0af7cb3fb4ec542e5e78797ceab0b6a openssl-devel-0.9.8e-37.el5_11.i386.rpm
20fb0e985ea59b9be61f3e6d587495cb7ee2025cfd9e28ef09ad0b4e89699b86 openssl-devel-0.9.8e-37.el5_11.x86_64.rpm
c449880136cd41fe52c7b63780efa09d9b22dce150de20fe6b69858e6d0a895e openssl-perl-0.9.8e-37.el5_11.x86_64.rpm

Source:
29519e5253fd59c1adbf00996f3a09d2e2547a1f6d37d3dd599b43c9dc1730f8 openssl-0.9.8e-37.el5_11.src.rpm

Cause:   Access control error, State error
Underlying OS:  Linux (CentOS)
Underlying OS Comments:  5

Message History:   This archive entry is a follow-up to the message listed below.
Dec 5 2015 OpenSSL Multiple Bugs Let Remote Users Deny Service and Obtain Potentially Sensitive Information



 Source Message Contents

Subject:  [CentOS-announce] CESA-2015:2616 Moderate CentOS 5 openssl Security Update


CentOS Errata and Security Advisory 2015:2616 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-2616.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
5a0e271012e83b468543bde0489d3bd192c9c903c5d859eaf1fbd7ec780c9d18  openssl-0.9.8e-37.el5_11.i386.rpm
6e18eb8abab97d5895cc871bb917e0bcef0390bfe564eda080efe5f310cb89a1  openssl-0.9.8e-37.el5_11.i686.rpm
201760f2b2e51d07abefeb8e4c0d88c9b0af7cb3fb4ec542e5e78797ceab0b6a  openssl-devel-0.9.8e-37.el5_11.i386.rpm
416df04d51c22373b9de55e0fe6afba549ae91eccb45d914828a6190f19fb66c  openssl-perl-0.9.8e-37.el5_11.i386.rpm

x86_64:
6e18eb8abab97d5895cc871bb917e0bcef0390bfe564eda080efe5f310cb89a1  openssl-0.9.8e-37.el5_11.i686.rpm
3fa25d9b5735ecd4d9b86b80fca104967d700e193e60f87dc6b2ba70a1b48980  openssl-0.9.8e-37.el5_11.x86_64.rpm
201760f2b2e51d07abefeb8e4c0d88c9b0af7cb3fb4ec542e5e78797ceab0b6a  openssl-devel-0.9.8e-37.el5_11.i386.rpm
20fb0e985ea59b9be61f3e6d587495cb7ee2025cfd9e28ef09ad0b4e89699b86  openssl-devel-0.9.8e-37.el5_11.x86_64.rpm
c449880136cd41fe52c7b63780efa09d9b22dce150de20fe6b69858e6d0a895e  openssl-perl-0.9.8e-37.el5_11.x86_64.rpm

Source:
29519e5253fd59c1adbf00996f3a09d2e2547a1f6d37d3dd599b43c9dc1730f8  openssl-0.9.8e-37.el5_11.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC