SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   OpenSSL Vendors:   OpenSSL.org
OpenSSL SSL3_AL_WARNING Alert Processing Flaw Lets Remote Users Consume Excessive CPU Resources on the Target System
SecurityTracker Alert ID:  1037084
SecurityTracker URL:  http://securitytracker.com/id/1037084
CVE Reference:   CVE-2016-8610   (Links to External Site)
Date:  Oct 24 2016
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 0.9.8, 1.0.1, 1.0.2 - 1.0.2h, 1.1.0
Description:   A vulnerability was reported in OpenSSL. A remote user can consume excessive CPU resources on the target system.

The ssl3_read_bytes() function in 'ssl/s3_pkt.c' does not properly handle certain packets. A remote user can send a flood of SSL3_AL_WARNING alerts during the SSL handshake to consume excessive CPU resources on the target system. As a result, services that use the OpenSSL library may become unavailable for the duration of the packet flood.

Shi Lei from Gear Team, Qihoo 360 Inc., reported this vulnerability.

Impact:   A remote user can consume excessive CPU resources on the target system.
Solution:   The vendor has issued a fix (1.0.2j, 1.1.0b).

[Editor's note: The fix was issued in September 2016 but was not reported as a security issue.]

Vendor URL:  openssl.org/ (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Nov 2 2016 (FreeBSD Issues Fix) OpenSSL SSL3_AL_WARNING Alert Processing Flaw Lets Remote Users Consume Excessive CPU Resources on the Target System
FreeBSD has issued a fix for FreeBSD 9.3, 10.1, 10.2, and 10.3.
Jan 31 2017 (Ubuntu Issues Fix) OpenSSL SSL3_AL_WARNING Alert Processing Flaw Lets Remote Users Consume Excessive CPU Resources on the Target System
Ubuntu has issued a fix for Ubuntu Linux 12.04 LTS, 14.04 LTS, 16.04 LTS, and 16.10.
Feb 20 2017 (Red Hat Issues Fix) OpenSSL SSL3_AL_WARNING Alert Processing Flaw Lets Remote Users Consume Excessive CPU Resources on the Target System
Red Hat has issued a fix for Red Hat Enterprise Linux 6 and 7.
Feb 21 2017 (Oracle Issues Fix for Oracle Linux) OpenSSL SSL3_AL_WARNING Alert Processing Flaw Lets Remote Users Consume Excessive CPU Resources on the Target System
Oracle has issued a fix for Oracle Linux 6 and 7.
Feb 21 2017 (IBM Issues Fix for IBM AIX) OpenSSL SSL3_AL_WARNING Alert Processing Flaw Lets Remote Users Consume Excessive CPU Resources on the Target System
IBM has issued a fix for IBM AIX 5.3, 6.1, 7.1, and 7.2.
Mar 21 2017 (Red Hat Issues Fix) OpenSSL SSL3_AL_WARNING Alert Processing Flaw Lets Remote Users Consume Excessive CPU Resources on the Target System
Red Hat has issued a fix for Red Hat Enterprise Linux 6.
Mar 22 2017 (IBM Issues Fix for IBM Rational ClearQuest) OpenSSL SSL3_AL_WARNING Alert Processing Flaw Lets Remote Users Consume Excessive CPU Resources on the Target System
IBM has issued a fix for IBM Rational ClearQuest.
Jul 25 2017 (IBM Issues Fix for IBM Rational Team Concert) OpenSSL SSL3_AL_WARNING Alert Processing Flaw Lets Remote Users Consume Excessive CPU Resources on the Target System
IBM has issued a fix for IBM Rational Team Concert.
Aug 17 2017 (IBM Issues Fix for IBM Security Access Manager) OpenSSL SSL3_AL_WARNING Alert Processing Flaw Lets Remote Users Consume Excessive CPU Resources on the Target System
IBM has issued a fix for IBM Security Access Manager.
Aug 29 2017 (Pulse Secure Issues Fix for Pulse Connect Secure) OpenSSL SSL3_AL_WARNING Alert Processing Flaw Lets Remote Users Consume Excessive CPU Resources on the Target System
Pulse Secure has issued a fix for Pulse Connect Secure.
Oct 15 2018 (HPE Issues Fix for HPE Intelligent Management Center) OpenSSL SSL3_AL_WARNING Alert Processing Flaw Lets Remote Users Consume Excessive CPU Resources on the Target System
HPE has issued a fix for HPE Intelligent Management Center.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC