5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.948 High
EPSS
Percentile
99.3%
Issue Overview:
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the CVE-2014-3568 fix.
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate’s unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role.
Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
Affected Packages:
openssl
Issue Correction:
Run yum update openssl to update your system.
New Packages:
i686:
openssl-debuginfo-1.0.1k-1.82.amzn1.i686
openssl-devel-1.0.1k-1.82.amzn1.i686
openssl-perl-1.0.1k-1.82.amzn1.i686
openssl-1.0.1k-1.82.amzn1.i686
openssl-static-1.0.1k-1.82.amzn1.i686
src:
openssl-1.0.1k-1.82.amzn1.src
x86_64:
openssl-devel-1.0.1k-1.82.amzn1.x86_64
openssl-static-1.0.1k-1.82.amzn1.x86_64
openssl-1.0.1k-1.82.amzn1.x86_64
openssl-perl-1.0.1k-1.82.amzn1.x86_64
openssl-debuginfo-1.0.1k-1.82.amzn1.x86_64
Red Hat: CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE-2015-0206
Mitre: CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE-2015-0206
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | openssl-debuginfo | < 1.0.1k-1.82.amzn1 | openssl-debuginfo-1.0.1k-1.82.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssl-devel | < 1.0.1k-1.82.amzn1 | openssl-devel-1.0.1k-1.82.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssl-perl | < 1.0.1k-1.82.amzn1 | openssl-perl-1.0.1k-1.82.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssl | < 1.0.1k-1.82.amzn1 | openssl-1.0.1k-1.82.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | openssl-static | < 1.0.1k-1.82.amzn1 | openssl-static-1.0.1k-1.82.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | openssl-devel | < 1.0.1k-1.82.amzn1 | openssl-devel-1.0.1k-1.82.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | openssl-static | < 1.0.1k-1.82.amzn1 | openssl-static-1.0.1k-1.82.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | openssl | < 1.0.1k-1.82.amzn1 | openssl-1.0.1k-1.82.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | openssl-perl | < 1.0.1k-1.82.amzn1 | openssl-perl-1.0.1k-1.82.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | openssl-debuginfo | < 1.0.1k-1.82.amzn1 | openssl-debuginfo-1.0.1k-1.82.amzn1.x86_64.rpm |