[NEWS] OpenSSL NULL Pointer Assignment and Kerberos Ciphersuites Out-of-bounds
From: SecuriTeam (support_at_securiteam.com)
To: email@example.com Date: 17 Mar 2004 19:17:05 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
OpenSSL NULL Pointer Assignment and Kerberos Ciphersuites Out-of-bounds
Two security issues have been discovered in OpenSSL, one vulnerability
affects the SSL Handshake stage of the protocol in which a NULL pointer
can be passed causing an exception, the other vulnerability affects
OpenSSL's support for Kerberos ciphersuites that can again be used to
cause an exception.
NULL-pointer Assignment During SSL Handshake
Testing performed by the OpenSSL group using the Codenomicon TLS Test Tool
uncovered a null-pointer assignment in the do_change_cipher_spec()
function. A remote attacker could perform a carefully crafted SSL/TLS
handshake against a server that used the OpenSSL library in such a way as
to cause OpenSSL to crash. Depending on the application this could lead to
a denial of service.
All versions of OpenSSL from 0.9.6c to 0.9.6k inclusive and from 0.9.7a to
0.9.7c inclusive are affected by this issue. Any application that makes
use of OpenSSL's SSL/TLS library may be affected. Please contact your
application vendor for details.
Out-of-bounds Read Affects Kerberos Ciphersuites
Stephen Henson discovered a flaw in SSL/TLS handshaking code when using
Kerberos ciphersuites. A remote attacker could perform a carefully crafted
SSL/TLS handshake against a server configured to use Kerberos ciphersuites
in such a way as to cause OpenSSL to crash. Most applications have no
ability to use Kerberos ciphersuites and will therefore be unaffected.
Versions 0.9.7a, 0.9.7b, and 0.9.7c of OpenSSL are affected by this issue.
Any application that makes use of OpenSSL's SSL/TLS library may be
affected. Please contact your application vendor for details.
Upgrade to OpenSSL 0.9.7d or 0.9.6m. Recompile any OpenSSL applications
statically linked to OpenSSL libraries.
OpenSSL 0.9.7d and OpenSSL 0.9.6m are available for download via HTTP and
FTP from the following master locations (you can find the various FTP
mirrors under <http://www.openssl.org/source/mirror.html>
The distribution file names are:
MD5 checksum: 1b49e90fc8a75c3a507c0a624529aca5
o openssl-0.9.6m.tar.gz [normal]
MD5 checksum: 1b63bfdca1c37837dddde9f1623498f9
o openssl-engine-0.9.6m.tar.gz [engine]
MD5 checksum: 4c39d2524bd466180f9077f8efddac8c
The checksums were calculated using the following command:
openssl md5 openssl-0.9*.tar.gz
Patches for these issues were created by Dr Stephen Henson
(firstname.lastname@example.org) of the OpenSSL core team. The OpenSSL team would like
to thank Codenomicon for supplying the TLS Test Tool that was used to
discover these vulnerabilities, and Joe Orton of Red Hat for performing
the majority of the testing.
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: email@example.com
In order to subscribe to the mailing list, simply forward this email to: firstname.lastname@example.org
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.