|
|
Log in / Subscribe / Register

openssl: multiple vulnerabilities

Package(s):openssl CVE #(s):CVE-2014-3569 CVE-2014-3570 CVE-2014-3571 CVE-2014-3572 CVE-2014-8275 CVE-2015-0204 CVE-2015-0205 CVE-2015-0206
Created:January 12, 2015 Updated:March 20, 2015
Description: From the CVE entries:

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the CVE-2014-3568 fix. (CVE-2014-3569)

The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c. (CVE-2014-3570)

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c. (CVE-2014-3571)

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message. (CVE-2014-3572)

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c. (CVE-2014-8275)

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role. (CVE-2015-0204)

The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support. (CVE-2015-0205)

Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection. (CVE-2015-0206)

Alerts:
SUSE SUSE-SU-2016:0113-1 java-1_6_0-ibm 2016-01-13
Oracle ELSA-2016-1137 openssl 2016-05-31
openSUSE openSUSE-SU-2016:0640-1 libopenssl0_9_8 2016-03-03
Oracle ELSA-2016-0302 openssl 2016-03-01
Oracle ELSA-2015-2616 openssl 2015-12-14
SUSE SUSE-SU-2015:2168-2 java-1_7_1-ibm 2015-12-14
SUSE SUSE-SU-2015:2216-1 java-1_7_0-ibm 2015-12-07
SUSE SUSE-SU-2015:2182-1 java-1_7_1-ibm 2015-12-03
SUSE SUSE-SU-2015:2192-1 java-1_6_0-ibm 2015-12-03
SUSE SUSE-SU-2015:2168-1 java-1_7_1-ibm 2015-12-02
SUSE SUSE-SU-2015:2166-1 java-1_6_0-ibm 2015-12-02
openSUSE openSUSE-SU-2015:1277-1 libressl 2015-07-22
Oracle ELSA-2015-1197 openssl 2015-06-30
SUSE SUSE-SU-2015:1161-1 java-1_6_0-ibm 2015-06-30
SUSE SUSE-SU-2015:1086-4 java-1_7_0-ibm 2015-06-27
SUSE SUSE-SU-2015:1086-3 Java 2015-06-24
SUSE SUSE-SU-2015:1138-1 IBM Java 2015-06-24
SUSE SUSE-SU-2015:1086-2 IBM Java 2015-06-22
SUSE SUSE-SU-2015:1086-1 IBM Java 2015-06-18
SUSE SUSE-SU-2015:1085-1 IBM Java 2015-06-18
SUSE SUSE-SU-2015:0946-1 MySQL 2015-05-26
Oracle ELSA-2015-0800 openssl 2015-04-13
CentOS CESA-2015:0800 openssl 2015-04-14
Scientific Linux SLSA-2015:0800-1 openssl 2015-04-13
Red Hat RHSA-2015:0800-01 openssl 2015-04-13
Mandriva MDVSA-2015:063 openssl 2015-03-27
Mandriva MDVSA-2015:062 openssl 2015-03-27
SUSE SUSE-SU-2015:0578-1 compat-openssl097g 2015-03-24
Gentoo 201503-11 openssl 2015-03-19
Oracle ELSA-2015-3010 openssl 2015-02-26
openSUSE openSUSE-SU-2015:0130-1 openssl 2015-01-23
Red Hat RHSA-2015:0066-01 openssl 2015-01-21
Oracle ELSA-2015-0066 openssl 2015-01-20
Oracle ELSA-2015-0066 openssl 2015-01-21
Fedora FEDORA-2015-0601 openssl 2015-01-20
CentOS CESA-2015:0066 openssl 2015-01-20
CentOS CESA-2015:0066 openssl 2015-01-20
Scientific Linux SLSA-2015:0066-1 openssl 2015-01-21
Ubuntu USN-2459-1 openssl 2015-01-12
Fedora FEDORA-2015-0512 openssl 2015-01-13
Slackware SSA:2015-009-01 openssl 2015-01-09
Mandriva MDVSA-2015:019 openssl 2015-01-09
Mageia MGASA-2015-0022 openssl 2015-01-11
Debian-LTS DLA-132-1 openssl 2015-01-11
Debian DSA-3125-1 openssl 2015-01-11

to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds