SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   OpenSSL Vendors:   OpenSSL.org
OpenSSL OCSP Status Request Extension Processing Error Lets Remote Authenticated Users Consume Excessive Memory Resources
SecurityTracker Alert ID:  1036878
SecurityTracker URL:  http://securitytracker.com/id/1036878
CVE Reference:   CVE-2016-6304   (Links to External Site)
Date:  Sep 22 2016
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.0.1, 1.0.2, 1.1.0
Description:   A vulnerability was reported in OpenSSL. A remote authenticated user can consume excessive memory on the target system.

A remote authenticated user can repeatedly request renegotiation and send a specially crafted OCSP Status Request extension to consume excessive memory on the target system.

Versions 1.0.1g and after are affected in the default configuration, even if OCSP is not supported.

Versions prior to 1.0.1g are affected only if the application using OpenSSL explicitly enables OCSP stapling support.

Builds that use the "no-ocsp" build time option are not affected.

The vendor was notified on August 29, 2016.

Shi Lei (Gear Team, Qihoo 360 Inc.) reported this vulnerability.

Impact:   A remote authenticated user can consume excessive memory resources on the target system.
Solution:   The vendor has issued a fix (1.0.1u, 1.0.2i, 1.1.0a).

The vendor advisory is available at:

https://www.openssl.org/news/secadv/20160922.txt

Vendor URL:  www.openssl.org/news/secadv/20160922.txt (Links to External Site)
Cause:   Resource error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Sep 23 2016 (FreeBSD Issues Fix) OpenSSL OCSP Status Request Extension Processing Error Lets Remote Authenticated Users Consume Excessive Memory Resources
FreeBSD has issued a fix for FreeBSD 9.3, 10.1, 10.2, 10.3, and 11.0.
Oct 18 2016 (MySQL.com Issues Fix for MySQL) OpenSSL OCSP Status Request Extension Processing Error Lets Remote Authenticated Users Consume Excessive Memory Resources
MySQL.com has issued a fix for MySQL.
Nov 15 2016 (IBM Issues Fix for IBM AIX) OpenSSL OCSP Status Request Extension Processing Error Lets Remote Authenticated Users Consume Excessive Memory Resources
IBM has issued a fix for IBM AIX 5.3, 6.1, 7.1, and 7.2.
Nov 17 2016 (Red Hat Issues Fix) OpenSSL OCSP Status Request Extension Processing Error Lets Remote Authenticated Users Consume Excessive Memory Resources
Red Hat has issued a fix for Red Hat Enterprise Linux 6.2, 6.4, 6.5, 6.6, and 6.7.
Mar 22 2017 (IBM Issues Fix for IBM Rational ClearQuest) OpenSSL OCSP Status Request Extension Processing Error Lets Remote Authenticated Users Consume Excessive Memory Resources
IBM has issued a fix for IBM Rational ClearQuest.
Jul 18 2017 (Oracle Issues Fix for Oracle E-Business Suite) OpenSSL OCSP Status Request Extension Processing Error Lets Remote Authenticated Users Consume Excessive Memory Resources
Oracle has issued a fix for Oracle E-Business Suite.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC