First published: Tue Jan 20 2015(Updated: )
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),<br>Transport Layer Security (TLS), and Datagram Transport Layer Security<br>(DTLS) protocols, as well as a full-strength, general purpose cryptography<br>library.<br>A NULL pointer dereference flaw was found in the DTLS implementation of<br>OpenSSL. A remote attacker could send a specially crafted DTLS message,<br>which would cause an OpenSSL server to crash. (CVE-2014-3571)<br>A memory leak flaw was found in the way the dtls1_buffer_record() function<br>of OpenSSL parsed certain DTLS messages. A remote attacker could send<br>multiple specially crafted DTLS messages to exhaust all available memory of<br>a DTLS server. (CVE-2015-0206)<br>It was found that OpenSSL's BigNumber Squaring implementation could produce<br>incorrect results under certain special conditions. This flaw could<br>possibly affect certain OpenSSL library functionality, such as RSA<br>blinding. Note that this issue occurred rarely and with a low probability,<br>and there is currently no known way of exploiting it. (CVE-2014-3570)<br>It was discovered that OpenSSL would perform an ECDH key exchange with a<br>non-ephemeral key even when the ephemeral ECDH cipher suite was selected.<br>A malicious server could make a TLS/SSL client using OpenSSL use a weaker<br>key exchange method than the one requested by the user. (CVE-2014-3572)<br>It was discovered that OpenSSL would accept ephemeral RSA keys when using<br>non-export RSA cipher suites. A malicious server could make a TLS/SSL<br>client using OpenSSL use a weaker key exchange method. (CVE-2015-0204)<br>Multiple flaws were found in the way OpenSSL parsed X.509 certificates.<br>An attacker could use these flaws to modify an X.509 certificate to produce<br>a certificate with a different fingerprint without invalidating its<br>signature, and possibly bypass fingerprint-based blacklisting in<br>applications. (CVE-2014-8275)<br>It was found that an OpenSSL server would, under certain conditions, accept<br>Diffie-Hellman client certificates without the use of a private key.<br>An attacker could use a user's client certificate to authenticate as that<br>user, without needing the private key. (CVE-2015-0205)<br>All OpenSSL users are advised to upgrade to these updated packages, which<br>contain a backported patch to mitigate the above issues. For the update to<br>take effect, all services linked to the OpenSSL library (such as httpd and<br>other SSL-enabled services) must be restarted or the system rebooted.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1e-34.el7_0.7 | 1.0.1e-34.el7_0.7 |
redhat/openssl-debuginfo | <1.0.1e-34.el7_0.7 | 1.0.1e-34.el7_0.7 |
redhat/openssl-debuginfo | <1.0.1e-34.el7_0.7 | 1.0.1e-34.el7_0.7 |
redhat/openssl-devel | <1.0.1e-34.el7_0.7 | 1.0.1e-34.el7_0.7 |
redhat/openssl-devel | <1.0.1e-34.el7_0.7 | 1.0.1e-34.el7_0.7 |
redhat/openssl-libs | <1.0.1e-34.el7_0.7 | 1.0.1e-34.el7_0.7 |
redhat/openssl-libs | <1.0.1e-34.el7_0.7 | 1.0.1e-34.el7_0.7 |
redhat/openssl-perl | <1.0.1e-34.el7_0.7 | 1.0.1e-34.el7_0.7 |
redhat/openssl-static | <1.0.1e-34.el7_0.7 | 1.0.1e-34.el7_0.7 |
redhat/openssl-static | <1.0.1e-34.el7_0.7 | 1.0.1e-34.el7_0.7 |
redhat/openssl | <1.0.1e-30.el6_6.5 | 1.0.1e-30.el6_6.5 |
redhat/openssl | <1.0.1e-30.el6_6.5 | 1.0.1e-30.el6_6.5 |
redhat/openssl-debuginfo | <1.0.1e-30.el6_6.5 | 1.0.1e-30.el6_6.5 |
redhat/openssl-debuginfo | <1.0.1e-30.el6_6.5 | 1.0.1e-30.el6_6.5 |
redhat/openssl-devel | <1.0.1e-30.el6_6.5 | 1.0.1e-30.el6_6.5 |
redhat/openssl-devel | <1.0.1e-30.el6_6.5 | 1.0.1e-30.el6_6.5 |
redhat/openssl-perl | <1.0.1e-30.el6_6.5 | 1.0.1e-30.el6_6.5 |
redhat/openssl-static | <1.0.1e-30.el6_6.5 | 1.0.1e-30.el6_6.5 |
redhat/openssl-perl | <1.0.1e-30.el6_6.5 | 1.0.1e-30.el6_6.5 |
redhat/openssl-static | <1.0.1e-30.el6_6.5 | 1.0.1e-30.el6_6.5 |
redhat/openssl | <1.0.1e-34.el7_0.7 | 1.0.1e-34.el7_0.7 |
redhat/openssl-perl | <1.0.1e-34.el7_0.7 | 1.0.1e-34.el7_0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.