Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2015:1182-2

Опубликовано: 24 окт. 2014
Источник: suse-cvrf

Описание

Security update for OpenSSL

This OpenSSL update fixes the following issues:

* Session Ticket Memory Leak (CVE-2014-3567) * Build option no-ssl3 is incomplete (CVE-2014-3568) * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)

Security Issues:

* CVE-2014-3567 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567> * CVE-2014-3566 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566> * CVE-2014-3568 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568>

Список пакетов

SUSE Linux Enterprise Desktop 11 SP3
libopenssl0_9_8-0.9.8j-0.66.1
libopenssl0_9_8-32bit-0.9.8j-0.66.1
openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3
libopenssl0_9_8-0.9.8j-0.66.1
libopenssl0_9_8-32bit-0.9.8j-0.66.1
libopenssl0_9_8-hmac-0.9.8j-0.66.1
libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1
libopenssl0_9_8-x86-0.9.8j-0.66.1
openssl-0.9.8j-0.66.1
openssl-doc-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA
libopenssl0_9_8-0.9.8j-0.66.1
libopenssl0_9_8-32bit-0.9.8j-0.66.1
libopenssl0_9_8-hmac-0.9.8j-0.66.1
libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1
libopenssl0_9_8-x86-0.9.8j-0.66.1
openssl-0.9.8j-0.66.1
openssl-doc-0.9.8j-0.66.1
SUSE Linux Enterprise Server for SAP Applications 11 SP3
libopenssl0_9_8-0.9.8j-0.66.1
libopenssl0_9_8-32bit-0.9.8j-0.66.1
libopenssl0_9_8-hmac-0.9.8j-0.66.1
libopenssl0_9_8-hmac-32bit-0.9.8j-0.66.1
libopenssl0_9_8-x86-0.9.8j-0.66.1
openssl-0.9.8j-0.66.1
openssl-doc-0.9.8j-0.66.1
SUSE Linux Enterprise Software Development Kit 11 SP3
libopenssl-devel-0.9.8j-0.66.1

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки

Описание

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:libopenssl0_9_8-32bit-0.9.8j-0.66.1
SUSE Linux Enterprise Desktop 11 SP3:openssl-0.9.8j-0.66.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.66.1

Ссылки
Уязвимость SUSE-SU-2015:1182-2