SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   OpenSSL Vendors:   OpenSSL.org
OpenSSL Multiple Bugs Let Remote Users Cause the Target Application to Crash
SecurityTracker Alert ID:  1037261
SecurityTracker URL:  http://securitytracker.com/id/1037261
CVE Reference:   CVE-2016-7053, CVE-2016-7054, CVE-2016-7055   (Links to External Site)
Date:  Nov 10 2016
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 1.0.2, 1.1.0 and later
Description:   Several vulnerabilities were reported in OpenSSL. A remote user can cause the target application to crash.

A remote user can send specially crafted payloads via a TLS connection using *-CHACHA20-POLY1305 ciphersuites to trigger a heap overflow and cause OpenSSL to crash [CVE-2016-7054]. Versions 1.1.0 and later are affected.

Robert Swiecki (Google Security Team) reported this vulnerability.

A remote user can send data with specially crafted cryptographic message syntax (CMS) structures to trigger a null pointer dereference in the processing of invalid encodings in the ASN.1 'CHOICE' type and cause the application using OpenSSL to crash [CVE-2016-7053].

Tyler Nighswander of ForAllSecure reported this vulnerability.

An error may occur in a Broadwell-specific Montgomery multiplication procedure on certain length data [CVE-2016-7055]. A remote user can send specially crafted data in certain cases to trigger errors in public-key operations in configurations where multiple remote clients select an affected EC algorithm and where the target server shares a private key between the multiple clients [which is not a default configuration]. Transient authentication and key negotiation failures may also occur. Versions prior to 1.0.2 are not affected.

Richard Morgan reported this vulnerability.

Impact:   A remote user can cause the target application using OpenSSL to crash.
Solution:   The vendor has issued a fix (1.1.0c).

A fixed version of 1.0.2 for CVE-2016-7055 is not available. The source code fix for that version is available via git as commit 57c4b9f6a2.

The vendor advisory is available at:

https://www.openssl.org/news/secadv/20161110.txt

Vendor URL:  www.openssl.org/news/secadv/20161110.txt (Links to External Site)
Cause:   Access control error, Boundary error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jan 31 2017 (Ubuntu Issues Fix) OpenSSL Multiple Bugs Let Remote Users Cause the Target Application to Crash
Ubuntu has issued a fix for Ubuntu Linux 12.04 LTS, 14.04 LTS, 16.04 LTS, and 16.10.
Feb 15 2017 (IBM Issues Fix for IBM Flex System Manager SMIA) OpenSSL Multiple Bugs Let Remote Users Cause the Target Application to Crash
IBM has issued a fix for the IBM Flex System Manager SMIA tool.
Feb 23 2017 (FreeBSD Issues Fix) OpenSSL Multiple Bugs Let Remote Users Cause the Target Application to Crash
FreeBSD has issued a fix for FreeBSD 10.3 and 11.0.
May 12 2017 (HPE Issues Fix for HPE Intelligent Management Center PLAT) OpenSSL Multiple Bugs Let Remote Users Cause the Target Application to Crash
HPE has issued a fix for HPE Intelligent Management Center iMC PLAT.
Jun 6 2017 (HPE Issues Advisory for HPE IceWall) OpenSSL Multiple Bugs Let Remote Users Cause the Target Application to Crash
HPE has issued an advisory for HPE IceWall.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC