First published: Thu Mar 25 2010(Updated: )
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)<br>and Transport Layer Security (TLS v1) protocols, as well as a<br>full-strength, general purpose cryptography library.<br>It was discovered that OpenSSL did not always check the return value of the<br>bn_wexpand() function. An attacker able to trigger a memory allocation<br>failure in that function could cause an application using the OpenSSL<br>library to crash or, possibly, execute arbitrary code. (CVE-2009-3245)<br>A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure<br>Sockets Layer) protocols handled session renegotiation. A man-in-the-middle<br>attacker could use this flaw to prefix arbitrary plain text to a client's<br>session (for example, an HTTPS connection to a website). This could force<br>the server to process an attacker's request as if authenticated using the<br>victim's credentials. This update addresses this flaw by implementing the<br>TLS Renegotiation Indication Extension, as defined in RFC 5746.<br>(CVE-2009-3555)<br>Refer to the following Knowledgebase article for additional details about<br>the CVE-2009-3555 flaw: <a href="http://kbase.redhat.com/faq/docs/DOC-20491" target="_blank">http://kbase.redhat.com/faq/docs/DOC-20491</a> A missing return value check flaw was discovered in OpenSSL, that could<br>possibly cause OpenSSL to call a Kerberos library function with invalid<br>arguments, resulting in a NULL pointer dereference crash in the MIT<br>Kerberos library. In certain configurations, a remote attacker could use<br>this flaw to crash a TLS/SSL server using OpenSSL by requesting Kerberos<br>cipher suites during the TLS handshake. (CVE-2010-0433)<br>All OpenSSL users should upgrade to these updated packages, which contain<br>backported patches to resolve these issues. For the update to take effect,<br>all services linked to the OpenSSL library must be restarted, or the system<br>rebooted.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <0.9.8e-12.el5_4.6 | 0.9.8e-12.el5_4.6 |
redhat/openssl | <0.9.8e-12.el5_4.6 | 0.9.8e-12.el5_4.6 |
redhat/openssl-devel | <0.9.8e-12.el5_4.6 | 0.9.8e-12.el5_4.6 |
redhat/openssl-devel | <0.9.8e-12.el5_4.6 | 0.9.8e-12.el5_4.6 |
redhat/openssl-perl | <0.9.8e-12.el5_4.6 | 0.9.8e-12.el5_4.6 |
redhat/openssl-perl | <0.9.8e-12.el5_4.6 | 0.9.8e-12.el5_4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0162 is classified as critical due to potential disruptions in secure communications.
To fix RHSA-2010:0162, update the OpenSSL package to version 0.9.8e-12.el5_4.6 or later.
RHSA-2010:0162 affects OpenSSL and related packages such as openssl-devel and openssl-perl.
Yes, RHSA-2010:0162 can potentially be exploited remotely due to its impact on SSL/TLS protocols.
Systems running affected versions of OpenSSL on Red Hat Enterprise Linux are impacted by RHSA-2010:0162.