Advisory Published

USN-2639-1: OpenSSL vulnerabilities

First published: Thu Jun 11 2015(Updated: )

Praveen Kariyanahalli, Ivan Fratric and Felix Groebert discovered that OpenSSL incorrectly handled memory when buffering DTLS data. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2014-8176) Joseph Barr-Pixton discovered that OpenSSL incorrectly handled malformed ECParameters structures. A remote attacker could use this issue to cause OpenSSL to hang, resulting in a denial of service. (CVE-2015-1788) Robert Swiecki and Hanno Böck discovered that OpenSSL incorrectly handled certain ASN1_TIME strings. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2015-1789) Michal Zalewski discovered that OpenSSL incorrectly handled missing content when parsing ASN.1-encoded PKCS#7 blobs. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2015-1790) Emilia Käsper discovered that OpenSSL incorrectly handled NewSessionTicket when being used by a multi-threaded client. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2015-1791) Johannes Bauer discovered that OpenSSL incorrectly handled verifying signedData messages using the CMS code. A remote attacker could use this issue to cause OpenSSL to hang, resulting in a denial of service. (CVE-2015-1792) As a security improvement, this update also modifies OpenSSL behaviour to reject DH key sizes below 768 bits, preventing a possible downgrade attack.

Affected SoftwareAffected VersionHow to fix
All of
ubuntu/libssl1.0.0<1.0.1f-1ubuntu11.4
1.0.1f-1ubuntu11.4
=15.04
All of
ubuntu/libssl1.0.0<1.0.1f-1ubuntu9.8
1.0.1f-1ubuntu9.8
=14.10
All of
ubuntu/libssl1.0.0<1.0.1f-1ubuntu2.15
1.0.1f-1ubuntu2.15
=14.04
All of
ubuntu/libssl1.0.0<1.0.1-4ubuntu5.31
1.0.1-4ubuntu5.31
=12.04

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of CVE-2014-8176?

    The severity of CVE-2014-8176 is high.

  • How does CVE-2014-8176 affect OpenSSL?

    CVE-2014-8176 affects OpenSSL by causing it to incorrectly handle memory when buffering DTLS data.

  • What is the remedy for CVE-2014-8176 in Ubuntu 15.04?

    The remedy for CVE-2014-8176 in Ubuntu 15.04 is to upgrade to version 1.0.1f-1ubuntu11.4 of libssl1.0.0.

  • What is the remedy for CVE-2014-8176 in Ubuntu 14.10?

    The remedy for CVE-2014-8176 in Ubuntu 14.10 is to upgrade to version 1.0.1f-1ubuntu9.8 of libssl1.0.0.

  • What is the remedy for CVE-2014-8176 in Ubuntu 14.04?

    The remedy for CVE-2014-8176 in Ubuntu 14.04 is to upgrade to version 1.0.1f-1ubuntu2.15 of libssl1.0.0.

  • What is the remedy for CVE-2014-8176 in Ubuntu 12.04?

    The remedy for CVE-2014-8176 in Ubuntu 12.04 is to upgrade to version 1.0.1-4ubuntu5.31 of libssl1.0.0.

  • What are some other vulnerabilities affecting libssl1.0.0 in Ubuntu?

    Some other vulnerabilities affecting libssl1.0.0 in Ubuntu include CVE-2015-1788 and CVE-2015-1789.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203