nessus
via4
|
NASL family | Fedora Local Security Checks | NASL id | FEDORA_2014-9308.NASL | description | Multiple moderate issues fixed.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2017-01-10 | plugin id | 77108 | published | 2014-08-10 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77108 | title | Fedora 20 : openssl-1.0.1e-39.fc20 (2014-9308) (Heartbleed) |
NASL family | Gentoo Local Security Checks | NASL id | GENTOO_GLSA-201412-39.NASL | description | The remote host is affected by the vulnerability described in GLSA-201412-39
(OpenSSL: Multiple vulnerabilities)
Multiple vulnerabilities have been discovered in OpenSSL. Please review
the CVE identifiers referenced below for details.
Impact :
A remote attacker may be able to cause a Denial of Service condition,
perform Man-in-the-Middle attacks, obtain sensitive information, or
bypass security restrictions.
Workaround :
There is no known workaround at this time. | last seen | 2019-01-16 | modified | 2015-06-08 | plugin id | 80244 | published | 2014-12-26 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=80244 | title | GLSA-201412-39 : OpenSSL: Multiple vulnerabilities |
NASL family | Fedora Local Security Checks | NASL id | FEDORA_2014-9301.NASL | description | Multiple moderate issues fixed.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2017-01-10 | plugin id | 77107 | published | 2014-08-10 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77107 | title | Fedora 19 : openssl-1.0.1e-39.fc19 (2014-9301) |
NASL family | SuSE Local Security Checks | NASL id | OPENSUSE-2016-294.NASL | description | This update for libopenssl0_9_8 fixes the following issues :
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
OpenSSL was vulnerable to a cross-protocol attack that
could lead to decryption of TLS sessions by using a
server supporting SSLv2 and EXPORT cipher suites as a
Bleichenbacher RSA padding oracle.
This update changes the openssl library to :
- Disable SSLv2 protocol support by default.
This can be overridden by setting the environment
variable 'OPENSSL_ALLOW_SSL2' or by using
SSL_CTX_clear_options using the SSL_OP_NO_SSLv2 flag.
Note that various services and clients had already
disabled SSL protocol 2 by default previously.
- Disable all weak EXPORT ciphers by default. These can be
reenabled if required by old legacy software using the
environment variable 'OPENSSL_ALLOW_EXPORT'.
- CVE-2016-0797 (bnc#968048): The BN_hex2bn() and
BN_dec2bn() functions had a bug that could result in an
attempt to de-reference a NULL pointer leading to
crashes. This could have security consequences if these
functions were ever called by user applications with
large untrusted hex/decimal data. Also, internal usage
of these functions in OpenSSL uses data from config
files or application command line arguments. If user
developed applications generated config file data based
on untrusted data, then this could have had security
consequences as well.
- CVE-2016-0799 (bnc#968374) On many 64 bit systems, the
internal fmtstr() and doapr_outch() functions could
miscalculate the length of a string and attempt to
access out-of-bounds memory locations. These problems
could have enabled attacks where large amounts of
untrusted data is passed to the BIO_*printf functions.
If applications use these functions in this way then
they could have been vulnerable. OpenSSL itself uses
these functions when printing out human-readable dumps
of ASN.1 data. Therefore applications that print this
data could have been vulnerable if the data is from
untrusted sources. OpenSSL command line applications
could also have been vulnerable when they print out
ASN.1 data, or if untrusted data is passed as command
line arguments. Libssl is not considered directly
vulnerable.
- The package was updated to 0.9.8zh :
- fixes many security vulnerabilities (not separately
listed): CVE-2015-3195, CVE-2015-1788, CVE-2015-1789,
CVE-2015-1790, CVE-2015-1792, CVE-2015-1791,
CVE-2015-0286, CVE-2015-0287, CVE-2015-0289,
CVE-2015-0293, CVE-2015-0209, CVE-2015-0288,
CVE-2014-3571, CVE-2014-3569, CVE-2014-3572,
CVE-2015-0204, CVE-2014-8275, CVE-2014-3570,
CVE-2014-3567, CVE-2014-3568, CVE-2014-3566,
CVE-2014-3510, CVE-2014-3507, CVE-2014-3506,
CVE-2014-3505, CVE-2014-3508, CVE-2014-0224,
CVE-2014-0221, CVE-2014-0195, CVE-2014-3470,
CVE-2014-0076, CVE-2013-0169, CVE-2013-0166
- avoid running OPENSSL_config twice. This avoids breaking
engine loading. (boo#952871, boo#967787)
- fix CVE-2015-3197 (boo#963415)
- SSLv2 doesn't block disabled ciphers | last seen | 2019-01-16 | modified | 2016-12-07 | plugin id | 89651 | published | 2016-03-04 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=89651 | title | openSUSE Security Update : libopenssl0_9_8 (openSUSE-2016-294) (DROWN) (FREAK) (POODLE) |
NASL family | Web Servers | NASL id | TOMCAT_8_0_15.NASL | description | According to its self-reported version number, the Apache Tomcat
server listening on the remote host is 8.0.x prior to 8.0.15. It is,
therefore, affected by the following vulnerabilities :
- A memory double-free error exists in 'd1_both.c' related
to handling DTLS packets that allows denial of service
attacks. (CVE-2014-3505)
- An unspecified error exists in 'd1_both.c' related to
handling DTLS handshake messages that allows denial of
service attacks due to large amounts of memory being
consumed. (CVE-2014-3506)
- A memory leak error exists in 'd1_both.c' related to
handling specially crafted DTLS packets that allows
denial of service attacks. (CVE-2014-3507)
- An error exists in the 'OBJ_obj2txt' function when
various 'X509_name_*' pretty printing functions are
used, which leak process stack data, resulting in an
information disclosure. (CVE-2014-3508)
- An error exists related to 'ec point format extension'
handling and multithreaded clients that allows freed
memory to be overwritten during a resumed session.
(CVE-2014-3509)
- A NULL pointer dereference error exists related to
handling anonymous ECDH cipher suites and crafted
handshake messages that allows denial of service attacks
against clients. (CVE-2014-3510)
- An error exists related to handling fragmented
'ClientHello' messages that allows a man-in-the-middle
attacker to force usage of TLS 1.0 regardless of higher
protocol levels being supported by both the server and
the client. (CVE-2014-3511)
- Buffer overflow errors exist in 'srp_lib.c' related to
handling Secure Remote Password protocol (SRP)
parameters, which can allow a denial of service or have
other unspecified impact. (CVE-2014-3512)
- A memory leak issue exists in 'd1_srtp.c' related to
the DTLS SRTP extension handling and specially crafted
handshake messages that can allow denial of service
attacks. (CVE-2014-3513)
- An error exists related to the way SSL 3.0 handles
padding bytes when decrypting messages encrypted using
block ciphers in cipher block chaining (CBC) mode.
Man-in-the-middle attackers can decrypt a selected byte
of a cipher text in as few as 256 tries if they are able
to force a victim application to repeatedly send the
same data over newly created SSL 3.0 connections. This
is also known as the 'POODLE' issue. (CVE-2014-3566)
- A memory leak issue exists in 't1_lib.c' related to
session ticket handling that can allow denial of service
attacks. (CVE-2014-3567)
- An error exists related to the build configuration
process and the 'no-ssl3' build option that allows
servers and clients to process insecure SSL 3.0
handshake messages. (CVE-2014-3568)
- A NULL pointer dereference error exists in 't1_lib.c',
related to handling Secure Remote Password protocol
(SRP) ServerHello messages, which allows a malicious
server to crash a client, resulting in a denial of
service. (CVE-2014-5139)
Note that Nessus has not attempted to exploit these issues but has
instead relied only on the application's self-reported version number. | last seen | 2019-01-16 | modified | 2018-08-01 | plugin id | 81651 | published | 2015-03-05 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=81651 | title | Apache Tomcat 8.0.x < 8.0.15 Multiple Vulnerabilities (POODLE) |
NASL family | Oracle Linux Local Security Checks | NASL id | ORACLELINUX_ELSA-2014-1052.NASL | description | From Red Hat Security Advisory 2014:1052 :
Updated openssl packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),
Transport Layer Security (TLS), and Datagram Transport Layer Security
(DTLS) protocols, as well as a full-strength, general purpose
cryptography library.
A race condition was found in the way OpenSSL handled ServerHello
messages with an included Supported EC Point Format extension. A
malicious server could possibly use this flaw to cause a
multi-threaded TLS/SSL client using OpenSSL to write into freed
memory, causing the client to crash or execute arbitrary code.
(CVE-2014-3509)
It was discovered that the OBJ_obj2txt() function could fail to
properly NUL-terminate its output. This could possibly cause an
application using OpenSSL functions to format fields of X.509
certificates to disclose portions of its memory. (CVE-2014-3508)
A flaw was found in the way OpenSSL handled fragmented handshake
packets. A man-in-the-middle attacker could use this flaw to force a
TLS/SSL server using OpenSSL to use TLS 1.0, even if both the client
and the server supported newer protocol versions. (CVE-2014-3511)
Multiple flaws were discovered in the way OpenSSL handled DTLS
packets. A remote attacker could use these flaws to cause a DTLS
server or client using OpenSSL to crash or use excessive amounts of
memory. (CVE-2014-3505, CVE-2014-3506, CVE-2014-3507)
A NULL pointer dereference flaw was found in the way OpenSSL performed
a handshake when using the anonymous Diffie-Hellman (DH) key exchange.
A malicious server could cause a DTLS client using OpenSSL to crash if
that client had anonymous DH cipher suites enabled. (CVE-2014-3510)
All OpenSSL users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. For the
update to take effect, all services linked to the OpenSSL library
(such as httpd and other SSL-enabled services) must be restarted or
the system rebooted. | last seen | 2019-01-16 | modified | 2015-12-01 | plugin id | 77191 | published | 2014-08-14 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77191 | title | Oracle Linux 6 / 7 : openssl (ELSA-2014-1052) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_11_LIBOPENSSL-DEVEL-140812.NASL | description | This OpenSSL update fixes the following security issue :
- Information leak in pretty printing functions.
(CVE-2014-3508). (bnc#890764)
- Double Free when processing DTLS packets.
(CVE-2014-3505). (bnc#890767)
- DTLS memory exhaustion. (CVE-2014-3506). (bnc#890768)
- DTLS memory leak from zero-length fragments.
(CVE-2014-3507). (bnc#890769)
- DTLS anonymous EC(DH) denial of service (CVE-2014-3510).
(bnc#890770) | last seen | 2018-09-01 | modified | 2015-01-28 | plugin id | 77299 | published | 2014-08-21 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77299 | title | SuSE 11.3 Security Update : OpenSSL (SAT Patch Number 9598) |
NASL family | Ubuntu Local Security Checks | NASL id | UBUNTU_USN-2308-1.NASL | description | Adam Langley and Wan-Teh Chang discovered that OpenSSL incorrectly
handled certain DTLS packets. A remote attacker could use this issue
to cause OpenSSL to crash, resulting in a denial of service.
(CVE-2014-3505)
Adam Langley discovered that OpenSSL incorrectly handled memory when
processing DTLS handshake messages. A remote attacker could use this
issue to cause OpenSSL to consume memory, resulting in a denial of
service. (CVE-2014-3506)
Adam Langley discovered that OpenSSL incorrectly handled memory when
processing DTLS fragments. A remote attacker could use this issue to
cause OpenSSL to leak memory, resulting in a denial of service. This
issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
(CVE-2014-3507)
Ivan Fratric discovered that OpenSSL incorrectly leaked information in
the pretty printing functions. When OpenSSL is used with certain
applications, an attacker may use this issue to possibly gain access
to sensitive information. (CVE-2014-3508)
Gabor Tyukasz discovered that OpenSSL contained a race condition when
processing serverhello messages. A malicious server could use this
issue to cause clients to crash, resulting in a denial of service.
This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
(CVE-2014-3509)
Felix Grobert discovered that OpenSSL incorrectly handled certain
DTLS handshake messages. A malicious server could use this issue to
cause clients to crash, resulting in a denial of service.
(CVE-2014-3510)
David Benjamin and Adam Langley discovered that OpenSSL incorrectly
handled fragmented ClientHello messages. If a remote attacker were
able to perform a man-in-the-middle attack, this flaw could be used to
force a protocol downgrade to TLS 1.0. This issue only affected Ubuntu
12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-3511)
Sean Devlin and Watson Ladd discovered that OpenSSL incorrectly
handled certain SRP parameters. A remote attacker could use this with
applications that use SRP to cause a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and
Ubuntu 14.04 LTS. (CVE-2014-3512)
Joonas Kuorilehto and Riku Hietamaki discovered that OpenSSL
incorrectly handled certain Server Hello messages that specify an SRP
ciphersuite. A malicious server could use this issue to cause clients
to crash, resulting in a denial of service. This issue only affected
Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-5139).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-12-01 | plugin id | 77085 | published | 2014-08-08 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77085 | title | Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS : openssl vulnerabilities (USN-2308-1) |
NASL family | Debian Local Security Checks | NASL id | DEBIAN_DLA-33.NASL | description | Detailed descriptions of the vulnerabilities can be found at:
https://www.openssl.org/news/secadv/20140806.txt
It's important that you upgrade the libssl0.9.8 package and not just
the openssl package.
All applications linked to openssl need to be restarted. You can use
the 'checkrestart' tool from the debian-goodies package to detect
affected programs. Alternatively, you may reboot your system.
NOTE: Tenable Network Security has extracted the preceding description
block directly from the DLA security advisory. Tenable has attempted
to automatically clean and format it as much as possible without
introducing additional issues. | last seen | 2019-01-16 | modified | 2018-07-06 | plugin id | 82181 | published | 2015-03-26 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=82181 | title | Debian DLA-33-1 : openssl security update |
NASL family | Web Servers | NASL id | TOMCAT_7_0_57.NASL | description | According to its self-reported version number, the Apache Tomcat
service listening on the remote host is 7.0.x prior to 7.0.57. It is,
therefore, affected by the following vulnerabilities :
- A memory double-free error exists in 'd1_both.c' related
to handling DTLS packets that allows denial of service
attacks. (CVE-2014-3505)
- An unspecified error exists in 'd1_both.c' related to
handling DTLS handshake messages that allows denial of
service attacks due to large amounts of memory being
consumed. (CVE-2014-3506)
- A memory leak error exists in 'd1_both.c' related to
handling specially crafted DTLS packets that allows
denial of service attacks. (CVE-2014-3507)
- An error exists in the 'OBJ_obj2txt' function when
various 'X509_name_*' pretty printing functions are
used, which leak process stack data, resulting in an
information disclosure. (CVE-2014-3508)
- An error exists related to 'ec point format extension'
handling and multithreaded clients that allows freed
memory to be overwritten during a resumed session.
(CVE-2014-3509)
- A NULL pointer dereference error exists related to
handling anonymous ECDH cipher suites and crafted
handshake messages that allows denial of service attacks
against clients. (CVE-2014-3510)
- An error exists related to handling fragmented
'ClientHello' messages that allows a man-in-the-middle
attacker to force usage of TLS 1.0 regardless of higher
protocol levels being supported by both the server and
the client. (CVE-2014-3511)
- Buffer overflow errors exist in 'srp_lib.c' related to
handling Secure Remote Password protocol (SRP)
parameters, which can allow a denial of service or have
other unspecified impact. (CVE-2014-3512)
- A memory leak issue exists in 'd1_srtp.c' related to
the DTLS SRTP extension handling and specially crafted
handshake messages that can allow denial of service
attacks. (CVE-2014-3513)
- An error exists related to the way SSL 3.0 handles
padding bytes when decrypting messages encrypted using
block ciphers in cipher block chaining (CBC) mode.
Man-in-the-middle attackers can decrypt a selected byte
of a cipher text in as few as 256 tries if they are able
to force a victim application to repeatedly send the
same data over newly created SSL 3.0 connections. This
is also known as the 'POODLE' issue. (CVE-2014-3566)
- A memory leak issue exists in 't1_lib.c' related to
session ticket handling that can allow denial of service
attacks. (CVE-2014-3567)
- An error exists related to the build configuration
process and the 'no-ssl3' build option that allows
servers and clients to process insecure SSL 3.0
handshake messages. (CVE-2014-3568)
- A NULL pointer dereference error exists in 't1_lib.c',
related to handling Secure Remote Password protocol
(SRP) ServerHello messages, which allows a malicious
server to crash a client, resulting in a denial of
service. (CVE-2014-5139)
Note that Nessus has not attempted to exploit these issues but has
instead relied only on the application's self-reported version number. | last seen | 2019-01-16 | modified | 2018-08-01 | plugin id | 81650 | published | 2015-03-05 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=81650 | title | Apache Tomcat 7.0.x < 7.0.57 Multiple Vulnerabilities (POODLE) |
NASL family | CGI abuses | NASL id | PFSENSE_SA-14_14.NASL | description | According to its self-reported version number, the remote pfSense
install is a version prior to 2.1.5 It is, therefore, affected by
multiple vulnerabilities. | last seen | 2019-01-16 | modified | 2018-03-22 | plugin id | 108516 | published | 2018-03-21 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=108516 | title | pfSense < 2.1.5 Multiple Vulnerabilities ( SA-14_14 ) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2014-1054.NASL | description | Updated openssl packages that fix multiple security issues are now
available for Red Hat Storage 2.1.
Red Hat Product Security has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),
Transport Layer Security (TLS), and Datagram Transport Layer Security
(DTLS) protocols, as well as a full-strength, general purpose
cryptography library.
A race condition was found in the way OpenSSL handled ServerHello
messages with an included Supported EC Point Format extension. A
malicious server could possibly use this flaw to cause a
multi-threaded TLS/SSL client using OpenSSL to write into freed
memory, causing the client to crash or execute arbitrary code.
(CVE-2014-3509)
It was discovered that the OBJ_obj2txt() function could fail to
properly NUL-terminate its output. This could possibly cause an
application using OpenSSL functions to format fields of X.509
certificates to disclose portions of its memory. (CVE-2014-3508)
A flaw was found in the way OpenSSL handled fragmented handshake
packets. A man-in-the-middle attacker could use this flaw to force a
TLS/SSL server using OpenSSL to use TLS 1.0, even if both the client
and the server supported newer protocol versions. (CVE-2014-3511)
Multiple flaws were discovered in the way OpenSSL handled DTLS
packets. A remote attacker could use these flaws to cause a DTLS
server or client using OpenSSL to crash or use excessive amounts of
memory. (CVE-2014-3505, CVE-2014-3506, CVE-2014-3507)
A NULL pointer dereference flaw was found in the way OpenSSL performed
a handshake when using the anonymous Diffie-Hellman (DH) key exchange.
A malicious server could cause a DTLS client using OpenSSL to crash if
that client had anonymous DH cipher suites enabled. (CVE-2014-3510)
All OpenSSL users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. For the
update to take effect, all services linked to the OpenSSL library must
be restarted or the system rebooted. | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 79040 | published | 2014-11-08 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=79040 | title | RHEL 6 : Storage Server (RHSA-2014:1054) |
NASL family | Debian Local Security Checks | NASL id | DEBIAN_DSA-2998.NASL | description | Multiple vulnerabilities have been identified in OpenSSL, a Secure
Sockets Layer toolkit, that may result in denial of service
(application crash, large memory consumption), information leak,
protocol downgrade. Additionally, a buffer overrun affecting only
applications explicitly set up for SRP has been fixed (CVE-2014-3512
).
Detailed descriptions of the vulnerabilities can be found at:
www.openssl.org/news/secadv/20140806.txt
It's important that you upgrade the libssl1.0.0 package and not just
the openssl package.
All applications linked to openssl need to be restarted. You can use
the 'checkrestart' tool from the debian-goodies package to detect
affected programs. Alternatively, you may reboot your system. | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 77035 | published | 2014-08-07 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77035 | title | Debian DSA-2998-1 : openssl - security update |
NASL family | OracleVM Local Security Checks | NASL id | ORACLEVM_OVMSA-2014-0012.NASL | description | The remote OracleVM system is missing necessary patches to address
critical security updates :
- fix CVE-2014-3505 - doublefree in DTLS packet processing
- fix CVE-2014-3506 - avoid memory exhaustion in DTLS
- fix CVE-2014-3507 - avoid memory leak in DTLS
- fix CVE-2014-3508 - fix OID handling to avoid
information leak
- fix CVE-2014-3509 - fix race condition when parsing
server hello
- fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling
in DTLS
- fix CVE-2014-3511 - disallow protocol downgrade via
fragmentation | last seen | 2019-01-16 | modified | 2018-07-24 | plugin id | 79536 | published | 2014-11-26 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=79536 | title | OracleVM 3.3 : openssl (OVMSA-2014-0012) |
NASL family | FreeBSD Local Security Checks | NASL id | FREEBSD_PKG_8AFF07EB1DBD11E4B6BA3C970E169BC2.NASL | description | The OpenSSL Project reports :
A flaw in OBJ_obj2txt may cause pretty printing functions such as
X509_name_oneline, X509_name_print_ex et al. to leak some information
from the stack. [CVE-2014-3508]
The issue affects OpenSSL clients and allows a malicious server to
crash the client with a NULL pointer dereference (read) by specifying
an SRP ciphersuite even though it was not properly negotiated with the
client. [CVE-2014-5139]
If a multithreaded client connects to a malicious server using a
resumed session and the server sends an ec point format extension it
could write up to 255 bytes to freed memory. [CVE-2014-3509]
An attacker can force an error condition which causes openssl to crash
whilst processing DTLS packets due to memory being freed twice. This
can be exploited through a Denial of Service attack. [CVE-2014-3505]
An attacker can force openssl to consume large amounts of memory
whilst processing DTLS handshake messages. This can be exploited
through a Denial of Service attack. [CVE-2014-3506]
By sending carefully crafted DTLS packets an attacker could cause
openssl to leak memory. This can be exploited through a Denial of
Service attack. [CVE-2014-3507]
OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are
subject to a denial of service attack. A malicious server can crash
the client with a NULL pointer dereference (read) by specifying an
anonymous (EC)DH ciphersuite and sending carefully crafted handshake
messages. [CVE-2014-3510]
A flaw in the OpenSSL SSL/TLS server code causes the server to
negotiate TLS 1.0 instead of higher protocol versions when the
ClientHello message is badly fragmented. This allows a
man-in-the-middle attacker to force a downgrade to TLS 1.0 even if
both the server and the client support a higher protocol version, by
modifying the client's TLS records. [CVE-2014-3511]
A malicious client or server can send invalid SRP parameters and
overrun an internal buffer. Only applications which are explicitly set
up for SRP use are affected. [CVE-2014-3512] | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 77036 | published | 2014-08-07 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77036 | title | FreeBSD : OpenSSL -- multiple vulnerabilities (8aff07eb-1dbd-11e4-b6ba-3c970e169bc2) |
NASL family | Slackware Local Security Checks | NASL id | SLACKWARE_SSA_2014-220-01.NASL | description | New openssl packages are available for Slackware 13.0, 13.1, 13.37,
14.0, 14.1, and -current to fix security issues. | last seen | 2019-01-16 | modified | 2015-01-28 | plugin id | 77091 | published | 2014-08-09 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77091 | title | Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : openssl (SSA:2014-220-01) |
NASL family | AIX Local Security Checks | NASL id | AIX_OPENSSL_ADVISORY10.NASL | description | The version of OpenSSL installed on the remote host is affected by the
following vulnerabilities :
- A memory double-free error exists related to handling
DTLS packets that allows denial of service attacks.
(CVE-2014-3505)
- An unspecified error exists related to handling DTLS
handshake messages that allows denial of service attacks
due to large amounts of memory being consumed.
(CVE-2014-3506)
- A memory leak error exists related to handling
specially crafted DTLS packets that allows denial of
service attacks. (CVE-2014-3507)
- An error exists related to 'OBJ_obj2txt' and the pretty
printing 'X509_name_*' functions which leak stack data,
resulting in an information disclosure. (CVE-2014-3508)
- An error exists related to 'ec point format extension'
handling and multithreaded clients that allows freed
memory to be overwritten during a resumed session.
(CVE-2014-3509)
- A NULL pointer dereference error exists related to
handling anonymous ECDH cipher suites and crafted
handshake messages that allow denial of service attacks
against clients. (CVE-2014-3510)
- An error exists related to handling fragmented
'ClientHello' messages that could allow a
man-in-the-middle attacker to force usage of TLS 1.0
regardless of higher protocol levels being supported by
both the server and the client. (CVE-2014-3511)
- A buffer overflow error exists related to handling
Secure Remote Password protocol (SRP) parameters having
unspecified impact. (CVE-2014-3512)
- A NULL pointer dereference error exists related to
handling Secure Remote Password protocol (SRP) that
allows a malicious server to crash a client, resulting
in a denial of service. (CVE-2014-5139) | last seen | 2019-01-16 | modified | 2018-07-17 | plugin id | 77603 | published | 2014-09-10 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77603 | title | AIX OpenSSL Advisory : openssl_advisory10.asc |
NASL family | Windows | NASL id | STUNNEL_5_03.NASL | description | The version of stunnel installed on the remote host is prior to
version 5.03. It is, therefore, affected by the following
vulnerabilities in the bundled OpenSSL library :
- A memory double-free error exists related to handling
DTLS packets that allows denial of service attacks.
(CVE-2014-3505)
- An unspecified error exists related to handling DTLS
handshake messages that allows denial of service attacks
due to large amounts of memory being consumed.
(CVE-2014-3506)
- A memory leak error exists related to handling
specially crafted DTLS packets that allows denial of
service attacks. (CVE-2014-3507)
- An error exists related to 'OBJ_obj2txt' and the pretty
printing 'X509_name_*' functions which leak stack data,
resulting in an information disclosure. (CVE-2014-3508)
- An error exists related to 'ec point format extension'
handling and multithreaded clients that allows freed
memory to be overwritten during a resumed session.
(CVE-2014-3509)
- A NULL pointer dereference error exists related to
handling anonymous ECDH cipher suites and crafted
handshake messages that allow denial of service attacks
against clients. (CVE-2014-3510)
- An error exists related to handling fragmented
'ClientHello' messages that could allow a
man-in-the-middle attacker to force usage of TLS 1.0
regardless of higher protocol levels being supported by
both the server and the client. (CVE-2014-3511)
- A buffer overflow error exists related to handling
Secure Remote Password protocol (SRP) parameters having
unspecified impact. (CVE-2014-3512)
- A NULL pointer dereference error exists related to
handling Secure Remote Password protocol (SRP) that
allows a malicious server to crash a client, resulting
in a denial of service. (CVE-2014-5139
Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number. | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 77182 | published | 2014-08-13 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77182 | title | stunnel < 5.03 OpenSSL Multiple Vulnerabilities |
NASL family | Windows | NASL id | VMWARE_VCENTER_CONVERTER_2014-0010.NASL | description | The version of VMware vCenter Converter installed on the remote
Windows host is 5.1.x prior to 5.1.2 or 5.5.x prior to 5.5.3. It is,
therefore, affected by the following vulnerabilities :
- A command injection vulnerability exists in GNU Bash
known as Shellshock, which is due to the processing of
trailing strings after function definitions in the
values of environment variables. This allows a remote
attacker to execute arbitrary code via environment
variable manipulation depending on the configuration of
the system. While this host is not directly impacted by
Shellshock, the standalone Converter application does
deploy a Helper VM during Linux P2V conversions. This
Helper VM contains a vulnerable version of Bash.
(CVE-2014-6271, CVE-2014-6277, CVE-2014-6278,
CVE-2014-7169, CVE-2014-7186, CVE-2014-7187)
- A memory double-free error exists in 'd1_both.c' related
to handling DTLS packets that allows denial of service
attacks. (CVE-2014-3505)
- An unspecified error exists in 'd1_both.c' related to
handling DTLS handshake messages that allows denial of
service attacks due to large amounts of memory being
consumed. (CVE-2014-3506)
- A memory leak error exists in 'd1_both.c' related to
handling specially crafted DTLS packets that allows
denial of service attacks. (CVE-2014-3507)
- A NULL pointer dereference error exists related to
handling anonymous ECDH cipher suites and crafted
handshake messages that allows denial of service attacks
against clients. (CVE-2014-3510) | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 79147 | published | 2014-11-12 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=79147 | title | VMware vCenter Converter 5.1.x < 5.1.2 / 5.5.x < 5.5.3 Multiple Vulnerabilities (VMSA-2014-0010) (Shellshock) |
NASL family | Fedora Local Security Checks | NASL id | FEDORA_2014-17576.NASL | description | - Synced with native openssl-1.0.1j-3.fc22\r\n* Add
support for RFC 5649\r\n* Prevent compiler warning
'Please include winsock2.h before windows.h' when using
the OpenSSL headers\r\n* Fixes various CVE's
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-12-05 | plugin id | 80319 | published | 2015-01-02 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=80319 | title | Fedora 21 : mingw-openssl-1.0.1j-1.fc21 (2014-17576) (POODLE) |
NASL family | Web Servers | NASL id | TOMCAT_6_0_43.NASL | description | According to its self-reported version number, the Apache Tomcat
service listening on the remote host is 6.0.x prior to 6.0.43. It is,
therefore, affected by the following vulnerabilities :
- An error exists in the function 'ssl3_read_bytes' that
can allow data to be injected into other sessions or
allow denial of service attacks. Note that this issue is
exploitable only if 'SSL_MODE_RELEASE_BUFFERS' is
enabled. (CVE-2010-5298)
- A buffer overflow error exists related to invalid DTLS
fragment handling that can lead to the execution of
arbitrary code. Note that this issue only affects
OpenSSL when used as a DTLS client or server.
(CVE-2014-0195)
- An error exists in the function 'do_ssl3_write' that
can allow a NULL pointer to be dereferenced leading to
denial of service attacks. Note that this issue is
exploitable only if 'SSL_MODE_RELEASE_BUFFERS' is
enabled. (CVE-2014-0198)
- An error exists related to DTLS handshake handling that
can lead to denial of service attacks. Note that this
issue only affects OpenSSL when used as a DTLS client.
(CVE-2014-0221)
- An unspecified error exists in how ChangeCipherSpec
messages are processed that can allow an attacker to
cause usage of weak keying material, leading to
simplified man-in-the-middle attacks. (CVE-2014-0224)
- An unspecified error exists related to anonymous ECDH
cipher suites that can allow denial of service attacks.
Note that this issue only affects OpenSSL TLS clients.
(CVE-2014-3470)
- A memory double-free error exists in 'd1_both.c' related
to handling DTLS packets that allows denial of service
attacks. (CVE-2014-3505)
- An unspecified error exists in 'd1_both.c' related to
handling DTLS handshake messages that allows denial of
service attacks due to large amounts of memory being
consumed. (CVE-2014-3506)
- A memory leak error exists in 'd1_both.c' related to
handling specially crafted DTLS packets that allows
denial of service attacks. (CVE-2014-3507)
- An error exists in the 'OBJ_obj2txt' function when
various 'X509_name_*' pretty printing functions are
used, which leak process stack data, resulting in an
information disclosure. (CVE-2014-3508)
- An error exists related to 'ec point format extension'
handling and multithreaded clients that allows freed
memory to be overwritten during a resumed session.
(CVE-2014-3509)
- A NULL pointer dereference error exists related to
handling anonymous ECDH cipher suites and crafted
handshake messages that allows denial of service attacks
against clients. (CVE-2014-3510)
- An error exists related to handling fragmented
'ClientHello' messages that allows a man-in-the-middle
attacker to force usage of TLS 1.0 regardless of higher
protocol levels being supported by both the server and
the client. (CVE-2014-3511)
- Buffer overflow errors exist in 'srp_lib.c' related to
handling Secure Remote Password protocol (SRP)
parameters, which can allow a denial of service or have
other unspecified impact. (CVE-2014-3512)
- A memory leak issue exists in 'd1_srtp.c' related to
the DTLS SRTP extension handling and specially crafted
handshake messages that can allow denial of service
attacks. (CVE-2014-3513)
- An error exists related to the way SSL 3.0 handles
padding bytes when decrypting messages encrypted using
block ciphers in cipher block chaining (CBC) mode.
Man-in-the-middle attackers can decrypt a selected byte
of a cipher text in as few as 256 tries if they are able
to force a victim application to repeatedly send the
same data over newly created SSL 3.0 connections. This
is also known as the 'POODLE' issue. (CVE-2014-3566)
- A memory leak issue exists in 't1_lib.c' related to
session ticket handling that can allow denial of service
attacks. (CVE-2014-3567)
- An error exists related to the build configuration
process and the 'no-ssl3' build option that allows
servers and clients to process insecure SSL 3.0
handshake messages. (CVE-2014-3568)
- A NULL pointer dereference error exists in 't1_lib.c',
related to handling Secure Remote Password protocol
(SRP) ServerHello messages, which allows a malicious
server to crash a client, resulting in a denial of
service. (CVE-2014-5139)
Note that Nessus has not attempted to exploit these issues but has
instead relied only on the application's self-reported version number. | last seen | 2019-01-16 | modified | 2018-09-17 | plugin id | 81649 | published | 2015-03-05 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=81649 | title | Apache Tomcat 6.0.x < 6.0.43 Multiple Vulnerabilities (POODLE) |
NASL family | Solaris Local Security Checks | NASL id | SOLARIS11_OPENSSL_20140915.NASL | description | The remote Solaris system is missing necessary patches to address
security updates :
- Double free vulnerability in d1_both.c in the DTLS
implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0
before 1.0.0n, and 1.0.1 before 1.0.1i allows remote
attackers to cause a denial of service (application
crash) via crafted DTLS packets that trigger an error
condition. (CVE-2014-3505)
- d1_both.c in the DTLS implementation in OpenSSL 0.9.8
before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before
1.0.1i allows remote attackers to cause a denial of
service (memory consumption) via crafted DTLS handshake
messages that trigger memory allocations corresponding
to large length values. (CVE-2014-3506)
- Memory leak in d1_both.c in the DTLS implementation in
OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and
1.0.1 before 1.0.1i allows remote attackers to cause a
denial of service (memory consumption) via zero-length
DTLS fragments that trigger improper handling of the
return value of a certain insert function.
(CVE-2014-3507)
- Race condition in the ssl_parse_serverhello_tlsext
function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and
1.0.1 before 1.0.1i, when multithreading and session
resumption are used, allows remote SSL servers to cause
a denial of service (memory overwrite and client
application crash) or possibly have unspecified other
impact by sending Elliptic Curve (EC) Supported Point
Formats Extension data. (CVE-2014-3509)
- The ssl3_send_client_key_exchange function in s3_clnt.c
in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n,
and 1.0.1 before 1.0.1i allows remote DTLS servers to
cause a denial of service (NULL pointer dereference and
client application crash) via a crafted handshake
message in conjunction with a (1) anonymous DH or (2)
anonymous ECDH ciphersuite. (CVE-2014-3510)
- Multiple buffer overflows in crypto/srp/srp_lib.c in the
SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow
remote attackers to cause a denial of service
(application crash) or possibly have unspecified other
impact via an invalid SRP (1) g, (2) A, or (3) B
parameter. (CVE-2014-3512)
- The ssl_set_client_disabled function in t1_lib.c in
OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to
cause a denial of service (NULL pointer dereference and
client application crash) via a ServerHello message that
includes an SRP ciphersuite without the required
negotiation of that ciphersuite with the client.
(CVE-2014-5139) | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 80722 | published | 2015-01-19 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=80722 | title | Oracle Solaris Third-Party Patch Update : openssl (cve_2014_3505_denial_of) |
NASL family | CentOS Local Security Checks | NASL id | CENTOS_RHSA-2014-1052.NASL | description | Updated openssl packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),
Transport Layer Security (TLS), and Datagram Transport Layer Security
(DTLS) protocols, as well as a full-strength, general purpose
cryptography library.
A race condition was found in the way OpenSSL handled ServerHello
messages with an included Supported EC Point Format extension. A
malicious server could possibly use this flaw to cause a
multi-threaded TLS/SSL client using OpenSSL to write into freed
memory, causing the client to crash or execute arbitrary code.
(CVE-2014-3509)
It was discovered that the OBJ_obj2txt() function could fail to
properly NUL-terminate its output. This could possibly cause an
application using OpenSSL functions to format fields of X.509
certificates to disclose portions of its memory. (CVE-2014-3508)
A flaw was found in the way OpenSSL handled fragmented handshake
packets. A man-in-the-middle attacker could use this flaw to force a
TLS/SSL server using OpenSSL to use TLS 1.0, even if both the client
and the server supported newer protocol versions. (CVE-2014-3511)
Multiple flaws were discovered in the way OpenSSL handled DTLS
packets. A remote attacker could use these flaws to cause a DTLS
server or client using OpenSSL to crash or use excessive amounts of
memory. (CVE-2014-3505, CVE-2014-3506, CVE-2014-3507)
A NULL pointer dereference flaw was found in the way OpenSSL performed
a handshake when using the anonymous Diffie-Hellman (DH) key exchange.
A malicious server could cause a DTLS client using OpenSSL to crash if
that client had anonymous DH cipher suites enabled. (CVE-2014-3510)
All OpenSSL users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. For the
update to take effect, all services linked to the OpenSSL library
(such as httpd and other SSL-enabled services) must be restarted or
the system rebooted. | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 77187 | published | 2014-08-14 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77187 | title | CentOS 6 / 7 : openssl (CESA-2014:1052) |
NASL family | Web Servers | NASL id | OPENSSL_0_9_8ZB.NASL | description | According to its banner, the remote web server uses a version of
OpenSSL 0.9.8 prior to 0.9.8zb. The OpenSSL library is, therefore,
affected by the following vulnerabilities :
- A memory double-free error exists related to handling
DTLS packets that allows denial of service attacks.
(CVE-2014-3505)
- An unspecified error exists related to handling DTLS
handshake messages that allows denial of service attacks
due to large amounts of memory being consumed.
(CVE-2014-3506)
- A memory leak error exists related to handling
specially crafted DTLS packets that allows denial of
service attacks. (CVE-2014-3507)
- An error exists related to 'OBJ_obj2txt' and the pretty
printing 'X509_name_*' functions which leak stack data,
resulting in an information disclosure. (CVE-2014-3508)
- A NULL pointer dereference error exists related to
handling anonymous ECDH cipher suites and crafted
handshake messages that allow denial of service attacks
against clients. (CVE-2014-3510) | last seen | 2019-01-16 | modified | 2018-07-16 | plugin id | 77086 | published | 2014-08-08 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77086 | title | OpenSSL 0.9.8 < 0.9.8zb Multiple Vulnerabilities |
NASL family | SuSE Local Security Checks | NASL id | OPENSUSE-2014-509.NASL | description | This openssl update fixes the following security issues :
- openssl 1.0.1i
- Information leak in pretty printing functions
(CVE-2014-3508)
- Crash with SRP ciphersuite in Server Hello message
(CVE-2014-5139)
- Race condition in ssl_parse_serverhello_tlsext
(CVE-2014-3509)
- Double Free when processing DTLS packets (CVE-2014-3505)
- DTLS memory exhaustion (CVE-2014-3506)
- DTLS memory leak from zero-length fragments
(CVE-2014-3507)
- OpenSSL DTLS anonymous EC(DH) denial of service
(CVE-2014-3510)
- OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
- SRP buffer overrun (CVE-2014-3512) | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 77317 | published | 2014-08-22 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77317 | title | openSUSE Security Update : openssl (openSUSE-SU-2014:1052-1) |
NASL family | Scientific Linux Local Security Checks | NASL id | SL_20140813_OPENSSL_ON_SL6_X.NASL | description | A race condition was found in the way OpenSSL handled ServerHello
messages with an included Supported EC Point Format extension. A
malicious server could possibly use this flaw to cause a
multi-threaded TLS/SSL client using OpenSSL to write into freed
memory, causing the client to crash or execute arbitrary code.
(CVE-2014-3509)
It was discovered that the OBJ_obj2txt() function could fail to
properly NUL-terminate its output. This could possibly cause an
application using OpenSSL functions to format fields of X.509
certificates to disclose portions of its memory. (CVE-2014-3508)
A flaw was found in the way OpenSSL handled fragmented handshake
packets. A man-in-the-middle attacker could use this flaw to force a
TLS/SSL server using OpenSSL to use TLS 1.0, even if both the client
and the server supported newer protocol versions. (CVE-2014-3511)
Multiple flaws were discovered in the way OpenSSL handled DTLS
packets. A remote attacker could use these flaws to cause a DTLS
server or client using OpenSSL to crash or use excessive amounts of
memory. (CVE-2014-3505, CVE-2014-3506, CVE-2014-3507)
A NULL pointer dereference flaw was found in the way OpenSSL performed
a handshake when using the anonymous Diffie-Hellman (DH) key exchange.
A malicious server could cause a DTLS client using OpenSSL to crash if
that client had anonymous DH cipher suites enabled. (CVE-2014-3510)
For the update to take effect, all services linked to the OpenSSL
library (such as httpd and other SSL-enabled services) must be
restarted or the system rebooted. | last seen | 2019-01-16 | modified | 2018-12-28 | plugin id | 77216 | published | 2014-08-15 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77216 | title | Scientific Linux Security Update : openssl on SL6.x i386/x86_64 |
NASL family | Fedora Local Security Checks | NASL id | FEDORA_2014-17587.NASL | description | - Synced with native openssl-1.0.1j-3.fc22\r\n* Add
support for RFC 5649\r\n* Prevent compiler warning
'Please include winsock2.h before windows.h' when using
the OpenSSL headers\r\n* Fixes various CVE's
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-12-05 | plugin id | 80322 | published | 2015-01-02 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=80322 | title | Fedora 20 : mingw-openssl-1.0.1j-1.fc20 (2014-17587) (POODLE) |
NASL family | OracleVM Local Security Checks | NASL id | ORACLEVM_OVMSA-2014-0032.NASL | description | The remote OracleVM system is missing necessary patches to address
critical security updates :
- fix CVE-2014-3567 - memory leak when handling session
tickets
- fix CVE-2014-3513 - memory leak in srtp support
- add support for fallback SCSV to partially mitigate
(CVE-2014-3566) (padding attack on SSL3)
- add ECC TLS extensions to DTLS (#1119800)
- fix CVE-2014-3505 - doublefree in DTLS packet processing
- fix CVE-2014-3506 - avoid memory exhaustion in DTLS
- fix CVE-2014-3507 - avoid memory leak in DTLS
- fix CVE-2014-3508 - fix OID handling to avoid
information leak
- fix CVE-2014-3509 - fix race condition when parsing
server hello
- fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling
in DTLS
- fix CVE-2014-3511 - disallow protocol downgrade via
fragmentation
- fix CVE-2014-0224 fix that broke EAP-FAST session
resumption support
- drop EXPORT, RC2, and DES from the default cipher list
(#1057520)
- print ephemeral key size negotiated in TLS handshake
(#1057715)
- do not include ECC ciphersuites in SSLv2 client hello
(#1090952)
- properly detect encryption failure in BIO (#1100819)
- fail on hmac integrity check if the .hmac file is empty
(#1105567)
- FIPS mode: make the limitations on DSA, DH, and RSA
keygen length enforced only if
OPENSSL_ENFORCE_MODULUS_BITS environment variable is set
- fix CVE-2010-5298 - possible use of memory after free
- fix CVE-2014-0195 - buffer overflow via invalid DTLS
fragment
- fix CVE-2014-0198 - possible NULL pointer dereference
- fix CVE-2014-0221 - DoS from invalid DTLS handshake
packet
- fix CVE-2014-0224 - SSL/TLS MITM vulnerability
- fix CVE-2014-3470 - client-side DoS when using anonymous
ECDH
- add back support for secp521r1 EC curve
- fix CVE-2014-0160 - information disclosure in TLS
heartbeat extension
- use 2048 bit RSA key in FIPS selftests
- add DH_compute_key_padded needed for FIPS CAVS testing
- make 3des strength to be 128 bits instead of 168
(#1056616)
- FIPS mode: do not generate DSA keys and DH parameters <
2048 bits
- FIPS mode: use approved RSA keygen (allows only 2048 and
3072 bit keys)
- FIPS mode: add DH selftest
- FIPS mode: reseed DRBG properly on RAND_add
- FIPS mode: add RSA encrypt/decrypt selftest
- FIPS mode: add hard limit for 2^32 GCM block encryptions
with the same key
- use the key length from configuration file if req
-newkey rsa is invoked
- fix CVE-2013-4353 - Invalid TLS handshake crash
- fix CVE-2013-6450 - possible MiTM attack on DTLS1
- fix CVE-2013-6449 - crash when version in SSL structure
is incorrect
- add back some no-op symbols that were inadvertently
dropped | last seen | 2019-01-16 | modified | 2018-09-05 | plugin id | 79547 | published | 2014-11-26 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=79547 | title | OracleVM 3.3 : openssl (OVMSA-2014-0032) (Heartbleed) (POODLE) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2014-1052.NASL | description | Updated openssl packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL),
Transport Layer Security (TLS), and Datagram Transport Layer Security
(DTLS) protocols, as well as a full-strength, general purpose
cryptography library.
A race condition was found in the way OpenSSL handled ServerHello
messages with an included Supported EC Point Format extension. A
malicious server could possibly use this flaw to cause a
multi-threaded TLS/SSL client using OpenSSL to write into freed
memory, causing the client to crash or execute arbitrary code.
(CVE-2014-3509)
It was discovered that the OBJ_obj2txt() function could fail to
properly NUL-terminate its output. This could possibly cause an
application using OpenSSL functions to format fields of X.509
certificates to disclose portions of its memory. (CVE-2014-3508)
A flaw was found in the way OpenSSL handled fragmented handshake
packets. A man-in-the-middle attacker could use this flaw to force a
TLS/SSL server using OpenSSL to use TLS 1.0, even if both the client
and the server supported newer protocol versions. (CVE-2014-3511)
Multiple flaws were discovered in the way OpenSSL handled DTLS
packets. A remote attacker could use these flaws to cause a DTLS
server or client using OpenSSL to crash or use excessive amounts of
memory. (CVE-2014-3505, CVE-2014-3506, CVE-2014-3507)
A NULL pointer dereference flaw was found in the way OpenSSL performed
a handshake when using the anonymous Diffie-Hellman (DH) key exchange.
A malicious server could cause a DTLS client using OpenSSL to crash if
that client had anonymous DH cipher suites enabled. (CVE-2014-3510)
All OpenSSL users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. For the
update to take effect, all services linked to the OpenSSL library
(such as httpd and other SSL-enabled services) must be restarted or
the system rebooted. | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 77194 | published | 2014-08-14 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77194 | title | RHEL 6 / 7 : openssl (RHSA-2014:1052) |
NASL family | Windows | NASL id | WINSCP_5_5_5.NASL | description | The WinSCP program installed on the remote host is version 4.3.8,
4.3.9, 4.4.0, or 5.x prior to 5.5.5. It therefore contains a bundled
version of OpenSSL prior to 1.0.1i which is affected by the following
vulnerabilities :
- A memory double-free error exists related to handling
DTLS packets that allows denial of service attacks.
(CVE-2014-3505)
- An unspecified error exists related to handling DTLS
handshake messages that allows denial of service attacks
due to large amounts of memory being consumed.
(CVE-2014-3506)
- A memory leak error exists related to handling
specially crafted DTLS packets that allows denial of
service attacks. (CVE-2014-3507)
- An error exists related to 'OBJ_obj2txt' and the pretty
printing 'X509_name_*' functions which leak stack data,
resulting in an information disclosure. (CVE-2014-3508)
- An error exists related to 'ec point format extension'
handling and multithreaded clients that allows freed
memory to be overwritten during a resumed session.
(CVE-2014-3509)
- A NULL pointer dereference error exists related to
handling anonymous ECDH cipher suites and crafted
handshake messages that allow denial of service attacks
against clients. (CVE-2014-3510)
- An error exists related to handling fragmented
'ClientHello' messages that allows a man-in-the-middle
attacker to force usage of TLS 1.0 regardless of higher
protocol levels being supported by both the server and
the client. (CVE-2014-3511)
- A buffer overflow error exists related to handling
Secure Remote Password protocol (SRP) parameters having
unspecified impact. (CVE-2014-3512)
- A NULL pointer dereference error exists related to
handling Secure Remote Password protocol (SRP) that
allows a malicious server to crash a client, resulting
in a denial of service. (CVE-2014-5139) | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 78078 | published | 2014-10-07 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=78078 | title | WinSCP 5.x < 5.5.5 Multiple Vulnerabilities |
NASL family | Web Servers | NASL id | OPENSSL_1_0_0N.NASL | description | According to its banner, the remote web server uses a version of
OpenSSL 1.0.0 prior to 1.0.0n. The OpenSSL library is, therefore,
affected by the following vulnerabilities :
- A memory double-free error exists related to handling
DTLS packets that allows denial of service attacks.
(CVE-2014-3505)
- An unspecified error exists related to handling DTLS
handshake messages that allows denial of service attacks
due to large amounts of memory being consumed.
(CVE-2014-3506)
- A memory leak error exists related to handling
specially crafted DTLS packets that allows denial of
service attacks. (CVE-2014-3507)
- An error exists related to 'OBJ_obj2txt' and the pretty
printing 'X509_name_*' functions which leak stack data,
resulting in an information disclosure. (CVE-2014-3508)
- An error exists related to 'ec point format extension'
handling and multithreaded clients that allows freed
memory to be overwritten during a resumed session.
(CVE-2014-3509)
- A NULL pointer dereference error exists related to
handling anonymous ECDH cipher suites and crafted
handshake messages that allow denial of service attacks
against clients. (CVE-2014-3510) | last seen | 2019-01-16 | modified | 2018-07-16 | plugin id | 77087 | published | 2014-08-08 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77087 | title | OpenSSL 1.0.0 < 1.0.0n Multiple Vulnerabilities |
NASL family | Amazon Linux Local Security Checks | NASL id | ALA_ALAS-2014-391.NASL | description | A flaw was discovered in the way OpenSSL handled DTLS packets. A
remote attacker could use this flaw to cause a DTLS server or client
using OpenSSL to crash or use excessive amounts of memory.
Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP
implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers
to cause a denial of service (application crash) or possibly have
unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B
parameter.
A flaw was found in the way OpenSSL handled fragmented handshake
packets. A man-in-the-middle attacker could use this flaw to force a
TLS/SSL server using OpenSSL to use TLS 1.0, even if both the client
and the server supported newer protocol versions.
A NULL pointer dereference flaw was found in the way OpenSSL performed
a handshake when using the anonymous Diffie-Hellman (DH) key exchange.
A malicious server could cause a DTLS client using OpenSSL to crash if
that client had anonymous DH cipher suites enabled.
It was discovered that the OBJ_obj2txt() function could fail to
properly NUL-terminate its output. This could possibly cause an
application using OpenSSL functions to format fields of X.509
certificates to disclose portions of its memory.
A race condition was found in the way OpenSSL handled ServerHello
messages with an included Supported EC Point Format extension. A
malicious server could possibly use this flaw to cause a
multi-threaded TLS/SSL client using OpenSSL to write into freed
memory, causing the client to crash or execute arbitrary code.
The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1
before 1.0.1i allows remote SSL servers to cause a denial of service
(NULL pointer dereference and client application crash) via a
ServerHello message that includes an SRP ciphersuite without the
required negotiation of that ciphersuite with the client. | last seen | 2019-01-16 | modified | 2018-04-18 | plugin id | 78334 | published | 2014-10-12 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=78334 | title | Amazon Linux AMI : openssl (ALAS-2014-391) |
NASL family | Web Servers | NASL id | OPENSSL_1_0_1I.NASL | description | According to its banner, the remote web server uses a version of
OpenSSL 1.0.1 prior to 1.0.1i. The OpenSSL library is, therefore,
affected by the following vulnerabilities :
- A memory double-free error exists related to handling
DTLS packets that allows denial of service attacks.
(CVE-2014-3505)
- An unspecified error exists related to handling DTLS
handshake messages that allows denial of service attacks
due to large amounts of memory being consumed.
(CVE-2014-3506)
- A memory leak error exists related to handling
specially crafted DTLS packets that allows denial of
service attacks. (CVE-2014-3507)
- An error exists related to 'OBJ_obj2txt' and the pretty
printing 'X509_name_*' functions which leak stack data,
resulting in an information disclosure. (CVE-2014-3508)
- An error exists related to 'ec point format extension'
handling and multithreaded clients that allows freed
memory to be overwritten during a resumed session.
(CVE-2014-3509)
- A NULL pointer dereference error exists related to
handling anonymous ECDH cipher suites and crafted
handshake messages that allow denial of service attacks
against clients. (CVE-2014-3510)
- An error exists related to handling fragmented
'ClientHello' messages that could allow a
man-in-the-middle attacker to force usage of TLS 1.0
regardless of higher protocol levels being supported by
both the server and the client. (CVE-2014-3511)
- A buffer overflow error exists related to handling
Secure Remote Password protocol (SRP) parameters having
unspecified impact. (CVE-2014-3512)
- A NULL pointer dereference error exists related to
handling Secure Remote Password protocol (SRP) that
allows a malicious server to crash a client, resulting
in a denial of service. (CVE-2014-5139) | last seen | 2019-01-16 | modified | 2018-07-16 | plugin id | 77088 | published | 2014-08-08 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77088 | title | OpenSSL 1.0.1 < 1.0.1i Multiple Vulnerabilities |
NASL family | Mandriva Local Security Checks | NASL id | MANDRIVA_MDVSA-2014-158.NASL | description | Multiple vulnerabilities has been discovered and corrected in
openssl :
A flaw in OBJ_obj2txt may cause pretty printing functions such as
X509_name_oneline, X509_name_print_ex et al. to leak some information
from the stack. Applications may be affected if they echo pretty
printing output to the attacker. OpenSSL SSL/TLS clients and servers
themselves are not affected (CVE-2014-3508).
If a multithreaded client connects to a malicious server using a
resumed session and the server sends an ec point format extension it
could write up to 255 bytes to freed memory (CVE-2014-3509).
An attacker can force an error condition which causes openssl to crash
whilst processing DTLS packets due to memory being freed twice. This
can be exploited through a Denial of Service attack (CVE-2014-3505).
An attacker can force openssl to consume large amounts of memory
whilst processing DTLS handshake messages. This can be exploited
through a Denial of Service attack (CVE-2014-3506).
By sending carefully crafted DTLS packets an attacker could cause
openssl to leak memory. This can be exploited through a Denial of
Service attack (CVE-2014-3507).
OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are
subject to a denial of service attack. A malicious server can crash
the client with a NULL pointer dereference (read) by specifying an
anonymous (EC)DH ciphersuite and sending carefully crafted handshake
messages (CVE-2014-3510).
The updated packages have been upgraded to the 1.0.0n version where
these security flaws has been fixed. | last seen | 2019-01-16 | modified | 2018-07-19 | plugin id | 77097 | published | 2014-08-09 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=77097 | title | Mandriva Linux Security Advisory : openssl (MDVSA-2014:158) |
|