OpenSSL Multiple Bugs Let Remote Users Cause the Target Service to Crash
|
SecurityTracker Alert ID: 1036885 |
SecurityTracker URL: http://securitytracker.com/id/1036885
|
CVE Reference:
CVE-2016-6302, CVE-2016-6303, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308, CVE-2016-6309, CVE-2016-7052
(Links to External Site)
|
Updated: Sep 26 2016
|
Original Entry Date: Sep 23 2016
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
Multiple vulnerabilities were reported in OpenSSL. A remote user can cause the target service or application to crash.
A remote user can send a specially crafted SHA512 TLS session ticket to trigger an out-of-bounds memory read error and cause the target server to crash [CVE-2016-6302].
A remote user can trigger an integer overflow in the MDC2_Update() function in 'crypto/mdc2/mdc2dgst.c' and cause the target service to crash in certain cases [CVE-2016-6303].
A remote user can trigger an out-of-bounds memory read error in the processing of certain TLS/SSL protocol handshake messages and cause the target application or service to crash [CVE-2016-6306]. Version 1.1.0 is not affected.
A remote user can trigger a memory allocation error in tls_get_message_header() to temporarily consume excessive memory resources on the target system [CVE-2016-6307]. DTLS users are not affected. Version 1.1.0 is affected.
A remote user can trigger a memory allocation error in dtls1_preprocess_fragment() to temporarily consume excessive memory resources on the target system [CVE-2016-6308]. TLS users are not affected. Version 1.1.0 is affected.
Shi Lei (Gear Team, Qihoo 360 Inc.) reported these vulnerabilities.
|
Impact:
A remote user can cause the target service or application to crash.
|
Solution:
The vendor has issued a fix (1.0.1u, 1.0.2i, 1.1.0a).
[Editor's note: On September 26, 2016, the vendor reported that two of the fixed versions contain vulnerabilities. Version 1.1.0a is affected by a use-after-free memory error (CVE-2016-6309), reported by Robert Swiecki (Google Security Team). Version 1.0.2i is affected by a CRL processing null pointer exception (CVE-2016-7052), reported by Bruce Stephens and Thomas Jakobi. The revised fixes are versions 1.1.0b and 1.0.2j.]
The vendor advisories are available at:
https://www.openssl.org/news/secadv/20160922.txt
https://www.openssl.org/news/secadv/20160926.txt
|
Vendor URL: www.openssl.org/news/secadv/20160922.txt (Links to External Site)
|
Cause:
Access control error, Boundary error, Resource error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|