-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2012-0002 Title: Multiple vulnerabilities in OpenSSL[1] Version history: 16.01.2012 Initial publication Summary ======= The OpenSSL project disclosed various vulnerabilities in their product (see below). The vulnerabilities allow unauthorized disclosure of information, unauthorized modification of files and disruption of service. + CVE-2011-4108 DTLS Plaintext Recovery Attack[2] The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack. CVSS v2 Base Score:4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:P/I:N/A:N) Remote: Yes Credibility: Vendor Confirmed Impact: Allows unauthorized disclosure of information + CVE-2011-4109 Double-free in Policy Checks[3] A double free vulnerability in OpenSSL 0.9.8 before 0.9.8s (when X509_V_FLAG_POLICY_CHECK is enabled) allows remote attackers to have an unspecified impact by triggering failure of a policy check. CVSS v2 Base Score:9.3 (HIGH) (AV:N/AC:M/Au:N/C:C/I:C/A:C) Remote: Yes Credibility: Vendor Confirmed Impact: Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service + CVE-2011-4576 Uninitialized SSL 3.0 Padding[4] The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer. CVSS v2 Base Score:5.0 (MEDIUM) (AV:N/AC:L/Au:N/C:P/I:N/A:N) Remote: Yes Credibility: Vendor Confirmed Ease: not complex Impact: Type allows unauthorized disclosure of information + CVE-2011-4577 Malformed RFC 3779 Data Can Cause Assertion Failures[5] OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers. CVSS v2 Base Score:4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:N/A:P) Remote: Yes Credibility: Vendor Confirmed Ease: unknown (vendor says "access complexity medium") + CVE-2011-4619 SGC Restart DoS Attack[6] The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service via unspecified vectors. CVSS v2 Base Score:5.0 (MEDIUM) (AV:N/AC:L/Au:N/C:N/I:N/A:P) Remote: Yes Credibility: Vendor Confirmed Ease: not complex + CVE-2012-0027 Invalid GOST parameters DoS Attack[7] (Only users of the OpenSSL GOST ENGINE are affected by this bug.) The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client. CVSS v2 Base Score:5.0 (MEDIUM) (AV:N/AC:L/Au:N/C:N/I:N/A:P) (legend) Remote: Yes Credibility: Vendor Confirmed Ease: not complex Vulnerable systems ================== OpenSSL before 1.0.0f or 0.9.8e (please refer to your vendor, Linux distributoe, etc. for an update of your flavour of the software) What can you do? ================ Updates for the generic OpenSSL packages are available; please refer to your vendor, Linux distributor, etc. for an update of your flavour of the software. What to tell your users? ======================== N/A More information ================ [1] http://www.openssl.org/news/secadv_20120104.txt [2] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4108 [3] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4109 [4] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4576 [5] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4577 [6] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4619 [7] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0027 [8] Information about CVSS: http://www.first.org/cvss/cvss-guide.html Best regards, CERT-EU CERT-EU Pre-configuration Team (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 (DISCLAIMER: CERT-EU, the CERT for the EU institutions, is currently in its setup phase, until May 2012. Services are provided in a pilot fashion, and are not yet fully functional. Announcements, alerts and warnings are sent out in best effort manner, and to contact information currently known to us. We apologise if you are not the correct recipient, or if you had already been warned about this issue from another source . Format, content and way of alerting are subject to change in the future. Contact information or even the team name may change as well.) -----BEGIN PGP SIGNATURE----- Version: BCPG v1.39 iQJXBAEBAgBBBQJPFDtfOhxDRVJUIGZvciB0aGUgRXVyb3BlYW4gSW5zdGl0dXRp b25zIDxjZXJ0LWV1QGVjLmV1cm9wYS5ldT4ACgkQJ6QGykasQ4Pkfw//dwMVk0T8 VaFHY0sWI6PzU2kLsB4qcxEYb6i5S3pnwH0aRCca3O6mDh3FiGy1cEFmQNWu7Kcj 8Xt/nuFkakLrsvEYwKgELdwxGlo4AMHf5rV8Rj2AvuPtekjd6nOi5xIfhn09Cx9z YmkqBTE0Ive7yNuBOGOPGGJmbm+xdzWEB3WCxawYjtk0els9VFsVUYkt94HOeaX1 oI+2aqgTRaOBFQkz+zx1Sfl9tGniVzwexCVhXPGMtZPxWlQy3ey2MNzLvsMJl/KC AwR52oXDS9+V3K+3hWZjRYll3uFXFatLcXieWh6g5VFSy+thFgL6drRO+gTIMcJ+ pWrjsnR2xhWPkDhOk7LlZJ3AmjqXxCjWgT8p1MnXLIsn8ZVDmkPdesHM0RJ3hdcB b9kVQuhJYuZZMb+8tO1Tdw3ALtfyALHVVdxnnKJG1rznvBpPn3IXprqOLcXFRkPn X4oeJCZVN/MQ6eKjhKxGC52axE/HQbS2I/t2nmsvF7O+mI4DkCxFuQcEah9KNJo2 OtpiKbO1nILOSc6NPPMmECWVzwf9mpkPvNsoGX+Q9Ax+jjyPybq10kwDn28RbTdZ fArMJC8Xlyot+Yh7bK364mn//9aAs7R8HMYNGt0edBy9yEbUDuj0iKjCBphsGgNH 5Tze6FwHFFp23GQ7W+0S5DLnjEEE9F27EEU= =Icux -----END PGP SIGNATURE-----