First published: Tue Feb 05 2013(Updated: )
A flaw in the OpenSSL handling of CBC ciphersuites in TLS 1.1 and TLS 1.2 on AES-NI (Advanced Encryption Standard New Instructions) supporting platforms [1] can be exploited in a DoS attack. Anyone using an AES-NI platform for TLS 1.2 or TLS 1.1 on OpenSSL 1.0.1c is affected. Platforms which do not support AES-NI or versions of OpenSSL which do not implement TLS 1.2 or 1.1 (for example OpenSSL 0.9.8 and 1.0.0) are not affected. [1] <a href="http://en.wikipedia.org/wiki/AES-NI#Supporting_CPUs">http://en.wikipedia.org/wiki/AES-NI#Supporting_CPUs</a> External References: <a href="http://www.openssl.org/news/secadv_20130205.txt">http://www.openssl.org/news/secadv_20130205.txt</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
OpenSSL OpenSSL | =1.0.1 | |
OpenSSL OpenSSL | =1.0.1a | |
OpenSSL OpenSSL | =1.0.1b | |
OpenSSL OpenSSL | =1.0.1c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.