CWE
119 416 476
Advisory Published

RHSA-2015:0715: Moderate: openssl security update

First published: Mon Mar 23 2015(Updated: )

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)<br>and Transport Layer Security (TLS v1) protocols, as well as a<br>full-strength, general purpose cryptography library.<br>An invalid pointer use flaw was found in OpenSSL's ASN1_TYPE_cmp()<br>function. A remote attacker could crash a TLS/SSL client or server using<br>OpenSSL via a specially crafted X.509 certificate when the<br>attacker-supplied certificate was verified by the application.<br>(CVE-2015-0286)<br>An integer underflow flaw, leading to a buffer overflow, was found in the<br>way OpenSSL decoded malformed Base64-encoded inputs. An attacker able to<br>make an application using OpenSSL decode a specially crafted Base64-encoded<br>input (such as a PEM file) could use this flaw to cause the application to<br>crash. Note: this flaw is not exploitable via the TLS/SSL protocol because<br>the data being transferred is not Base64-encoded. (CVE-2015-0292)<br>A denial of service flaw was found in the way OpenSSL handled SSLv2<br>handshake messages. A remote attacker could use this flaw to cause a<br>TLS/SSL server using OpenSSL to exit on a failed assertion if it had both<br>the SSLv2 protocol and EXPORT-grade cipher suites enabled. (CVE-2015-0293)<br>A use-after-free flaw was found in the way OpenSSL imported malformed<br>Elliptic Curve private keys. A specially crafted key file could cause an<br>application using OpenSSL to crash when imported. (CVE-2015-0209)<br>An out-of-bounds write flaw was found in the way OpenSSL reused certain<br>ASN.1 structures. A remote attacker could possibly use a specially crafted<br>ASN.1 structure that, when parsed by an application, would cause that<br>application to crash. (CVE-2015-0287)<br>A NULL pointer dereference flaw was found in OpenSSL's X.509 certificate<br>handling implementation. A specially crafted X.509 certificate could cause<br>an application using OpenSSL to crash if the application attempted to<br>convert the certificate to a certificate request. (CVE-2015-0288)<br>A NULL pointer dereference was found in the way OpenSSL handled certain<br>PKCS#7 inputs. An attacker able to make an application using OpenSSL<br>verify, decrypt, or parse a specially crafted PKCS#7 input could cause that<br>application to crash. TLS/SSL clients and servers using OpenSSL were not<br>affected by this flaw. (CVE-2015-0289)<br>Red Hat would like to thank the OpenSSL project for reporting<br>CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0292,<br>and CVE-2015-0293. Upstream acknowledges Stephen Henson of the OpenSSL<br>development team as the original reporter of CVE-2015-0286, Emilia Käsper<br>of the OpenSSL development team as the original reporter of CVE-2015-0287,<br>Brian Carpenter as the original reporter of CVE-2015-0288, Michal Zalewski<br>of Google as the original reporter of CVE-2015-0289, Robert Dugal and David<br>Ramos as the original reporters of CVE-2015-0292, and Sean Burford of<br>Google and Emilia Käsper of the OpenSSL development team as the original<br>reporters of CVE-2015-0293.<br>All openssl users are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues. For the update to take<br>effect, all services linked to the OpenSSL library must be restarted, or<br>the system rebooted.<br>

Affected SoftwareAffected VersionHow to fix
redhat/openssl<1.0.1e-30.el6_6.7
1.0.1e-30.el6_6.7
redhat/openssl<1.0.1e-30.el6_6.7
1.0.1e-30.el6_6.7
redhat/openssl-debuginfo<1.0.1e-30.el6_6.7
1.0.1e-30.el6_6.7
redhat/openssl-debuginfo<1.0.1e-30.el6_6.7
1.0.1e-30.el6_6.7
redhat/openssl-devel<1.0.1e-30.el6_6.7
1.0.1e-30.el6_6.7
redhat/openssl-devel<1.0.1e-30.el6_6.7
1.0.1e-30.el6_6.7
redhat/openssl-perl<1.0.1e-30.el6_6.7
1.0.1e-30.el6_6.7
redhat/openssl-static<1.0.1e-30.el6_6.7
1.0.1e-30.el6_6.7
redhat/openssl-perl<1.0.1e-30.el6_6.7
1.0.1e-30.el6_6.7
redhat/openssl-static<1.0.1e-30.el6_6.7
1.0.1e-30.el6_6.7

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203