First published: Tue Jan 19 2010(Updated: )
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)<br>and Transport Layer Security (TLS v1) protocols, as well as a<br>full-strength, general purpose cryptography library.<br>It was found that the OpenSSL library did not properly re-initialize its<br>internal state in the SSL_library_init() function after previous calls to<br>the CRYPTO_cleanup_all_ex_data() function, which would cause a memory leak<br>for each subsequent SSL connection. This flaw could cause server<br>applications that call those functions during reload, such as a combination<br>of the Apache HTTP Server, mod_ssl, PHP, and cURL, to consume all available<br>memory, resulting in a denial of service. (CVE-2009-4355)<br>Dan Kaminsky found that browsers could accept certificates with MD2 hash<br>signatures, even though MD2 is no longer considered a cryptographically<br>strong algorithm. This could make it easier for an attacker to create a<br>malicious certificate that would be treated as trusted by a browser.<br>OpenSSL now disables the use of the MD2 algorithm inside signatures by<br>default. (CVE-2009-2409)<br>All OpenSSL users should upgrade to these updated packages, which contain<br>backported patches to resolve these issues. For the update to take effect,<br>all services linked to the OpenSSL library must be restarted, or the system<br>rebooted.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <0.9.8e-12.el5_4.1 | 0.9.8e-12.el5_4.1 |
redhat/openssl | <0.9.8e-12.el5_4.1 | 0.9.8e-12.el5_4.1 |
redhat/openssl-devel | <0.9.8e-12.el5_4.1 | 0.9.8e-12.el5_4.1 |
redhat/openssl-devel | <0.9.8e-12.el5_4.1 | 0.9.8e-12.el5_4.1 |
redhat/openssl-perl | <0.9.8e-12.el5_4.1 | 0.9.8e-12.el5_4.1 |
redhat/openssl-perl | <0.9.8e-12.el5_4.1 | 0.9.8e-12.el5_4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.