Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2015:0553-1

Опубликовано: 18 мар. 2015
Источник: suse-cvrf

Описание

Security update for compat-openssl098

OpenSSL was updated to fix various security issues.

Following security issues were fixed:

  • CVE-2015-0209: A Use After Free following d2i_ECPrivatekey error was fixed which could lead to crashes for attacker supplied Elliptic Curve keys. This could be exploited over SSL connections with client supplied keys.

  • CVE-2015-0286: A segmentation fault in ASN1_TYPE_cmp was fixed that could be exploited by attackers when e.g. client authentication is used. This could be exploited over SSL connections.

  • CVE-2015-0287: A ASN.1 structure reuse memory corruption was fixed. This problem can not be exploited over regular SSL connections, only if specific client programs use specific ASN.1 routines.

  • CVE-2015-0288: A X509_to_X509_REQ NULL pointer dereference was fixed, which could lead to crashes. This function is not commonly used, and not reachable over SSL methods.

  • CVE-2015-0289: Several PKCS7 NULL pointer dereferences were fixed, which could lead to crashes of programs using the PKCS7 APIs. The SSL apis do not use those by default.

  • CVE-2015-0292: Various issues in base64 decoding were fixed, which could lead to crashes with memory corruption, for instance by using attacker supplied PEM data.

  • CVE-2015-0293: Denial of service via reachable assert in SSLv2 servers, could be used by remote attackers to terminate the server process. Note that this requires SSLv2 being allowed, which is not the default.

  • CVE-2009-5146: A memory leak in the TLS hostname extension was fixed, which could be used by remote attackers to run SSL services out of memory.

Список пакетов

SUSE Linux Enterprise Module for Legacy 12
libopenssl0_9_8-0.9.8j-73.2
libopenssl0_9_8-32bit-0.9.8j-73.2

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.


Затронутые продукты
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-73.2
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-73.2

Ссылки

Описание

Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.


Затронутые продукты
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-73.2
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-73.2

Ссылки

Описание

The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.


Затронутые продукты
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-73.2
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-73.2

Ссылки

Описание

The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.


Затронутые продукты
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-73.2
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-73.2

Ссылки

Описание

The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.


Затронутые продукты
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-73.2
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-73.2

Ссылки

Описание

The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.


Затронутые продукты
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-73.2
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-73.2

Ссылки

Описание

Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.


Затронутые продукты
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-73.2
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-73.2

Ссылки

Описание

The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.


Затронутые продукты
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-73.2
SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-73.2

Ссылки
Уязвимость SUSE-SU-2015:0553-1