Lucene search

K
archlinuxArch LinuxASA-201410-6
HistoryOct 16, 2014 - 12:00 a.m.

openssl: denial of service / man-in-the-middle / poodle mitigation

2014-10-1600:00:00
Arch Linux
lists.archlinux.org
33

EPSS

0.975

Percentile

100.0%

SRTP Memory Leak (CVE-2014-3513)

A flaw in the DTLS SRTP extension parsing code allows an attacker, who
sends a carefully crafted handshake message, to cause OpenSSL to fail
to free up to 64k of memory causing a memory leak. This could be
exploited in a Denial Of Service attack. This issue affects OpenSSL
1.0.1 server implementations for both SSL/TLS and DTLS regardless of
whether SRTP is used or configured. Implementations of OpenSSL that
have been compiled with OPENSSL_NO_SRTP defined are not affected.

Session Ticket Memory Leak (CVE-2014-3567)

When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
integrity of that ticket is first verified. In the event of a session
ticket integrity check failing, OpenSSL will fail to free memory
causing a memory leak. By sending a large number of invalid session
tickets an attacker could exploit this issue in a Denial Of Service
attack.

Build option no-ssl3 is incomplete (CVE-2014-3568)

When OpenSSL is configured with "no-ssl3" as a build option, servers
could accept and complete a SSL 3.0 handshake, and clients could be
configured to send them.

SSL 3.0 Fallback protection

OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
to block the ability for a MITM attacker to force a protocol
downgrade.

Some client applications (such as browsers) will reconnect using a
downgraded protocol to work around interoperability bugs in older
servers. This could be exploited by an active man-in-the-middle to
downgrade connections to SSL 3.0 even if both sides of the connection
support higher protocols. SSL 3.0 contains a number of weaknesses
including POODLE (CVE-2014-3566).

OSVersionArchitecturePackageVersionFilename
anyanyanyopenssl< 1.0.1.j-1UNKNOWN