First published: Thu Jun 11 2015(Updated: )
Praveen Kariyanahalli, Ivan Fratric and Felix Groebert discovered that OpenSSL incorrectly handled memory when buffering DTLS data. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2014-8176) Joseph Barr-Pixton discovered that OpenSSL incorrectly handled malformed ECParameters structures. A remote attacker could use this issue to cause OpenSSL to hang, resulting in a denial of service. (CVE-2015-1788) Robert Swiecki and Hanno Böck discovered that OpenSSL incorrectly handled certain ASN1_TIME strings. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2015-1789) Michal Zalewski discovered that OpenSSL incorrectly handled missing content when parsing ASN.1-encoded PKCS#7 blobs. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2015-1790) Emilia Käsper discovered that OpenSSL incorrectly handled NewSessionTicket when being used by a multi-threaded client. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2015-1791) Johannes Bauer discovered that OpenSSL incorrectly handled verifying signedData messages using the CMS code. A remote attacker could use this issue to cause OpenSSL to hang, resulting in a denial of service. (CVE-2015-1792) As a security improvement, this update also modifies OpenSSL behaviour to reject DH key sizes below 768 bits, preventing a possible downgrade attack.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssl1.0.0 | <1.0.1f-1ubuntu11.4 | 1.0.1f-1ubuntu11.4 |
=15.04 | ||
All of | ||
ubuntu/libssl1.0.0 | <1.0.1f-1ubuntu9.8 | 1.0.1f-1ubuntu9.8 |
=14.10 | ||
All of | ||
ubuntu/libssl1.0.0 | <1.0.1f-1ubuntu2.15 | 1.0.1f-1ubuntu2.15 |
=14.04 | ||
All of | ||
ubuntu/libssl1.0.0 | <1.0.1-4ubuntu5.31 | 1.0.1-4ubuntu5.31 |
=12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of CVE-2014-8176 is high.
CVE-2014-8176 affects OpenSSL by causing it to incorrectly handle memory when buffering DTLS data.
The remedy for CVE-2014-8176 in Ubuntu 15.04 is to upgrade to version 1.0.1f-1ubuntu11.4 of libssl1.0.0.
The remedy for CVE-2014-8176 in Ubuntu 14.10 is to upgrade to version 1.0.1f-1ubuntu9.8 of libssl1.0.0.
The remedy for CVE-2014-8176 in Ubuntu 14.04 is to upgrade to version 1.0.1f-1ubuntu2.15 of libssl1.0.0.
The remedy for CVE-2014-8176 in Ubuntu 12.04 is to upgrade to version 1.0.1-4ubuntu5.31 of libssl1.0.0.
Some other vulnerabilities affecting libssl1.0.0 in Ubuntu include CVE-2015-1788 and CVE-2015-1789.