본문 바로가기

취약점 정보1

Critical OpenSSL Patch Available. Patch Now!

728x90

The OpenSSL team released a critical security update today. The update patches 6 flaws. 1 of the flaws (CVE-2014-0195) may lead to arbitrary code execution. [1]

All versions of OpenSSL are vulnerable to CVE-2014-0195, but this vulnerability only affects DTLS clients or servers (look for SSL VPNs... not so much HTTPS).

I also rated CVE-2014-0224 critical, since it does allow for MiTM attacks, one of the reasons you use SSL. But in order to exploit this issue, both client and server have to be vulnerable, and only openssl 1.0.1 is vulnerable on servers (which is why I stuck with "important" for servers). The discoverer of this vulnerability released details here: http://ccsinjection.lepidum.co.jp/blog/2014-06-05/CCS-Injection-en/index.html .

CVE-2010-5298 does allow third parties to inject data into existing SSL connections. This could be a big deal, but according to the OpenSSL advisory, the SSL_MODE_RELEASE_BUFFERS feature is usually not enabled. 

Make sure you update to one of these OpenSSL versions:

OpenSSL 0.9.8za   (openssl ran out of letters, so instead of calling this one 'z' they call it 'za' to allow for future releases. However, this *may* be the last 0.9.8 release).
OpenSSL 1.0.0m
OpenSSL 1.0.1h

CVENameImpactVulnerable VersionsClientServer
CVE-2014-0224SSL/TLS MITM VulnerabilityMiTMServer: 1.0.1, Client: 0.9.8,1.0.0,1.0.1 (both have to be vulnerable)CriticalImportant
CVE-2014-0221DTLS recursion flawDoS0.9.8,1.0.0,1.0.1ImportantNot Affected
CVE-2014-0195DTLS invalid fragment vulnerabilityCode Exec.0.9.8,1.0.0,1.0.1CriticalCritical
CVE-2014-0198SSL_MODE_RELEASE_BUFFERS NULL pointer dereferenceDoS1.0.0,1.0.1
(neither affected in default config)
ImportantImportant
CVE-2010-5298SSL_MODE_RELEASE_BUFFERS session injectionDoS or Data Injection1.0.0, 1.0.1
(in multithreaded applications, not in default config)
ImportantImportant
CVE-2014-3470Anonymous ECDH Denial of ServiceDoS0.9.8, 1.0.0, 1.0.1ImportantNot Affected

Vendor Information:

Redhathttps://rhn.redhat.com/errata/RHSA-2014-0625.html
https://rhn.redhat.com/errata/RHSA-2014-0626.html
Ubuntuhttp://www.ubuntu.com/usn/usn-2232-1/
FreeBSDhttp://www.freebsd.org/security/advisories/FreeBSD-SA-14:14.openssl.asc

[1] https://www.openssl.org/news/secadv_20140605.txt

---

728x90