Nytro Posted October 15, 2014 Report Posted October 15, 2014 OpenSSL Security Advisory [15 Oct 2014]=======================================SRTP Memory Leak (CVE-2014-3513)================================Severity: HighA flaw in the DTLS SRTP extension parsing code allows an attacker, whosends a carefully crafted handshake message, to cause OpenSSL to failto free up to 64k of memory causing a memory leak. This could beexploited in a Denial Of Service attack. This issue affects OpenSSL1.0.1 server implementations for both SSL/TLS and DTLS regardless ofwhether SRTP is used or configured. Implementations of OpenSSL thathave been compiled with OPENSSL_NO_SRTP defined are not affected.OpenSSL 1.0.1 users should upgrade to 1.0.1j.This issue was reported to OpenSSL on 26th September 2014, based on an originalissue and patch developed by the LibreSSL project. Further analysis of the issuewas performed by the OpenSSL team.The fix was developed by the OpenSSL team.Session Ticket Memory Leak (CVE-2014-3567)==========================================Severity: MediumWhen an OpenSSL SSL/TLS/DTLS server receives a session ticket theintegrity of that ticket is first verified. In the event of a sessionticket integrity check failing, OpenSSL will fail to free memorycausing a memory leak. By sending a large number of invalid sessiontickets an attacker could exploit this issue in a Denial Of Serviceattack.OpenSSL 1.0.1 users should upgrade to 1.0.1j.OpenSSL 1.0.0 users should upgrade to 1.0.0o.OpenSSL 0.9.8 users should upgrade to 0.9.8zc. This issue was reported to OpenSSL on 8th October 2014.The fix was developed by Stephen Henson of the OpenSSL core team.SSL 3.0 Fallback protection===========================Severity: MediumOpenSSL has added support for TLS_FALLBACK_SCSV to allow applicationsto block the ability for a MITM attacker to force a protocoldowngrade.Some client applications (such as browsers) will reconnect using adowngraded protocol to work around interoperability bugs in olderservers. This could be exploited by an active man-in-the-middle todowngrade connections to SSL 3.0 even if both sides of the connectionsupport higher protocols. SSL 3.0 contains a number of weaknessesincluding POODLE (CVE-2014-3566).OpenSSL 1.0.1 users should upgrade to 1.0.1j.OpenSSL 1.0.0 users should upgrade to 1.0.0o.OpenSSL 0.9.8 users should upgrade to 0.9.8zc. https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00https://www.openssl.org/~bodo/ssl-poodle.pdfSupport for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo Moeller.Build option no-ssl3 is incomplete (CVE-2014-3568)==================================================Severity: LowWhen OpenSSL is configured with "no-ssl3" as a build option, serverscould accept and complete a SSL 3.0 handshake, and clients could beconfigured to send them.OpenSSL 1.0.1 users should upgrade to 1.0.1j.OpenSSL 1.0.0 users should upgrade to 1.0.0o.OpenSSL 0.9.8 users should upgrade to 0.9.8zc. This issue was reported to OpenSSL by Akamai Technologies on 14th October 2014.The fix was developed by Akamai and the OpenSSL team.References==========URL for this Security Advisory:https://www.openssl.org/news/secadv_20141015.txtNote: the online version of the advisory may be updated with additionaldetails over time.For details of OpenSSL severity classifications please see:https://www.openssl.org/about/secpolicy.htmlSursa: https://www.openssl.org/news/secadv_20141015.txt Quote