Nytro Posted January 9, 2015 Report Posted January 9, 2015 OpenSSL Security Advisory [08 Jan 2015]=======================================DTLS segmentation fault in dtls1_get_record (CVE-2014-3571)===========================================================Severity: ModerateA carefully crafted DTLS message can cause a segmentation fault in OpenSSL dueto a NULL pointer dereference. This could lead to a Denial Of Service attack.This issue affects all current OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1k.OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0p.OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8zd.This issue was reported to OpenSSL on 22nd October 2014 by Markus Stenberg ofCisco Systems, Inc. The fix was developed by Stephen Henson of the OpenSSLcore team.DTLS memory leak in dtls1_buffer_record (CVE-2015-0206)=======================================================Severity: ModerateA memory leak can occur in the dtls1_buffer_record function under certainconditions. In particular this could occur if an attacker sent repeated DTLSrecords with the same sequence number but for the next epoch. The memory leakcould be exploited by an attacker in a Denial of Service attack through memoryexhaustion.This issue affects OpenSSL versions: 1.0.1 and 1.0.0.OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1k.OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0p.This issue was reported to OpenSSL on 7th January 2015 by Chris Mueller who alsoprovided an initial patch. Further analysis was performed by Matt Caswell of theOpenSSL development team, who also developed the final patch.no-ssl3 configuration sets method to NULL (CVE-2014-3569)=========================================================Severity: LowWhen openssl is built with the no-ssl3 option and a SSL v3 ClientHello isreceived the ssl method would be set to NULL which could later result ina NULL pointer dereference.This issue affects all current OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.OpenSSL 1.0.1 users should upgrade to 1.0.1k.OpenSSL 1.0.0 users should upgrade to 1.0.0p.OpenSSL 0.9.8 users should upgrade to 0.9.8zd.This issue was reported to OpenSSL on 17th October 2014 by Frank Schmirler. Thefix was developed by Kurt Roeckx.ECDHE silently downgrades to ECDH [Client] (CVE-2014-3572)==========================================================Severity: LowAn OpenSSL client will accept a handshake using an ephemeral ECDH ciphersuiteusing an ECDSA certificate if the server key exchange message is omitted. Thiseffectively removes forward secrecy from the ciphersuite.This issue affects all current OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.OpenSSL 1.0.1 users should upgrade to 1.0.1k.OpenSSL 1.0.0 users should upgrade to 1.0.0p.OpenSSL 0.9.8 users should upgrade to 0.9.8zd.This issue was reported to OpenSSL on 22nd October 2014 by KarthikeyanBhargavan of the PROSECCO team at INRIA. The fix was developed by StephenHenson of the OpenSSL core team.RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)==============================================================Severity: LowAn OpenSSL client will accept the use of an RSA temporary key in a non-exportRSA key exchange ciphersuite. A server could present a weak temporary keyand downgrade the security of the session.This issue affects all current OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.OpenSSL 1.0.1 users should upgrade to 1.0.1k.OpenSSL 1.0.0 users should upgrade to 1.0.0p.OpenSSL 0.9.8 users should upgrade to 0.9.8zd.This issue was reported to OpenSSL on 22nd October 2014 by KarthikeyanBhargavan of the PROSECCO team at INRIA. The fix was developed by StephenHenson of the OpenSSL core team.DH client certificates accepted without verification [Server] (CVE-2015-0205)=============================================================================Severity: LowAn OpenSSL server will accept a DH certificate for client authenticationwithout the certificate verify message. This effectively allows a clientto authenticate without the use of a private key. This only affects serverswhich trust a client certificate authority which issues certificatescontaining DH keys: these are extremely rare and hardly ever encountered.This issue affects OpenSSL versions: 1.0.1 and 1.0.0.OpenSSL 1.0.1 users should upgrade to 1.0.1k.OpenSSL 1.0.0 users should upgrade to 1.0.0p.This issue was reported to OpenSSL on 22nd October 2014 by KarthikeyanBhargavan of the PROSECCO team at INRIA. The fix was developed by StephenHenson of the OpenSSL core team.Certificate fingerprints can be modified (CVE-2014-8275)========================================================Severity: LowOpenSSL accepts several non-DER-variations of certificate signaturealgorithm and signature encodings. OpenSSL also does not enforce amatch between the signature algorithm between the signed and unsignedportions of the certificate. By modifying the contents of thesignature algorithm or the encoding of the signature, it is possibleto change the certificate's fingerprint.This does not allow an attacker to forge certificates, and does notaffect certificate verification or OpenSSL servers/clients in anyother way. It also does not affect common revocation mechanisms. Onlycustom applications that rely on the uniqueness of the fingerprint(e.g. certificate blacklists) may be affected.This issue affects all current OpenSSL versions: 1.0.1, 1.0.0 and0.9.8.OpenSSL 1.0.1 users should upgrade to 1.0.1k.OpenSSL 1.0.0 users should upgrade to 1.0.0p.OpenSSL 0.9.8 users should upgrade to 0.9.8zd.One variant of this issue was discovered by Antti Karjalainen andTuomo Untinen from the Codenomicon CROSS program and reported toOpenSSL on 1st December 2014 by NCSC-FI VulnerabilityCo-ordination. Another variant was independently reported to OpenSSLon 12th December 2014 by Konrad Kraszewski from Google. Furtheranalysis was conducted and fixes were developed by Stephen Henson ofthe OpenSSL core team.Bignum squaring may produce incorrect results (CVE-2014-3570)=============================================================Severity: LowBignum squaring (BN_sqr) may produce incorrect results on someplatforms, including x86_64. This bug occurs at random with a verylow probability, and is not known to be exploitable in any way, thoughits exact impact is difficult to determine. The following has beendetermined:*) The probability of BN_sqr producing an incorrect result at randomis very low: 1/2^64 on the single affected 32-bit platform (MIPS) and1/2^128 on affected 64-bit platforms.*) On most platforms, RSA follows a different code path and RSAoperations are not affected at all. For the remaining platforms(e.g. OpenSSL built without assembly support), pre-existingcountermeasures thwart bug attacks [1].*) Static ECDH is theoretically affected: it is possible to constructelliptic curve points that would falsely appear to be on the givencurve. However, there is no known computationally feasible way toconstruct such points with low order, and so the security of staticECDH private keys is believed to be unaffected.*) Other routines known to be theoretically affected are modularexponentiation, primality testing, DSA, RSA blinding, JPAKE andSRP. No exploits are known and straightforward bug attacks fail -either the attacker cannot control when the bug triggers, or noprivate key material is involved.This issue affects all current OpenSSL versions: 1.0.1, 1.0.0 and 0.9.8.OpenSSL 1.0.1 users should upgrade to 1.0.1k.OpenSSL 1.0.0 users should upgrade to 1.0.0p.OpenSSL 0.9.8 users should upgrade to 0.9.8zd.This issue was reported to OpenSSL on 2nd November 2014 by Pieter Wuille(Blockstream) who also suggested an initial fix. Further analysis wasconducted by the OpenSSL development team and Adam Langley ofGoogle. The final fix was developed by Andy Polyakov of the OpenSSLcore team.[1] http://css.csail.mit.edu/6.858/2013/readings/rsa-bug-attacks.pdfNote====As per our previous announcements and our Release Strategy(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for thesereleases will be provided after that date. Users of these releases are advisedto upgrade.References==========URL for this Security Advisory:https://www.openssl.org/news/secadv_20150108.txtNote: the online version of the advisory may be updated with additionaldetails over time.For details of OpenSSL severity classifications please see:https://www.openssl.org/about/secpolicy.htmlSursa: https://www.openssl.org/news/secadv_20150108.txt Quote
Aerosol Posted January 9, 2015 Report Posted January 9, 2015 Am gasit si: OpenSSL Toolkit 1.0.1kDownloadOpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. 3 1 Quote