Skip to main content

OpenSSL Multiple Vulnerabilities

Last Update Date: 9 Dec 2015 Release Date: 7 Dec 2015 3479 Views

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

TYPE: Security Software & Appliance

Multiple vulnerabilities have been identified in OpenSSL. A remote user can cause the target service to crash and obtain potentially sensitive information on the target system.

  • A remote server can send a specially crafted ServerKeyExchange for an anonymous DH ciphersuite with the value of p set to 0 to potentially cause the target service to crash
  • A remote user can exploit a carry propagation flaw in BN_mod_exp() to potentially determine information about the private key in certain situations.
  • A remote user can send a certificate with a specially crafted ASN.1 signature that uses the RSA PSS algorithm and does not contain the mast generation function parameter to trigger a null pointer dereference and crash.
  • A remote user can supply a specially crafted X509_ATTRIBUTE structure to trigger a memory leak and potentially disclose sensitive information.
  • A remote user can send send PSK identity hints to a multi-threaded client to trigger a race condition and then a double free memory error and cause the target service to crash.

 


Impact

  • Denial of Service
  • Information Disclosure

System / Technologies affected

  • Prior to versions 0.9.8zh, 1.0.0t, 1.0.1q, 1.0.2e

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • The vendor has issued a fix (0.9.8zh, 1.0.0t, 1.0.1q, 1.0.2e).

Vulnerability Identifier


Source


Related Link