(Oracle Issues Fix for Oracle PeopleSoft Products) OpenSSL Bugs Let Users Deny Service and Bypass Authentication in Certain Cases
|
SecurityTracker Alert ID: 1041893 |
SecurityTracker URL: http://securitytracker.com/id/1041893
|
CVE Reference:
CVE-2018-0739
(Links to External Site)
|
Date: Oct 16 2018
|
Impact:
Denial of service via network, Modification of system information
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
Two vulnerabilities were reported in OpenSSL. A user can cause denial of service conditions on the target system. A user can bypass authentication in certain cases. Oracle PeopleSoft Products is affected.
A user can create specially crafted ASN.1 data with a recursive definition that, when processed by the target application using the OpenSSL library, will consume excessive stack memory [CVE-2018-0739]. SSL/TLS is not an attack vector.
The PA-RISC CRYPTO_memcmp() function used on HP-UX PA-RISC targets does not properly compare byte values [CVE-2018-0733]. As a result, a user can create forged messages, some of which may be authenticated. The vulnerable module is only compiled by the HP-UX assembler. Version 1.1.0 is affected.
Peter Waltenberg (IBM) reported the CRYPTO_memcmp() vulnerability.
|
Impact:
A user can cause denial of service conditions.
A user can bypass authentication on the target system in certain cases.
|
Solution:
Oracle has issued a fix for CVE-2018-0739 for Oracle PeopleSoft Products.
The Oracle advisory is available at:
https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
|
Vendor URL: www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html (Links to External Site)
|
Cause:
Access control error, Authentication error
|
Underlying OS: Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), UNIX (Tru64), Windows (NT), Windows (2000), Windows (2003), Windows (XP)
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|