Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in OpenSSL
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in OpenSSL
ID: MDVSA-2014:105
Distribution: Mandriva
Plattformen: Mandriva Enterprise Server 5.0
Datum: Mo, 9. Juni 2014, 22:44
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
http://www.openssl.org/news/secadv_20140605.txt
Applikationen: OpenSSL

Originalnachricht

This is a multi-part message in MIME format...

------------=_1402335211-30545-0

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:105
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : openssl
Date : June 9, 2014
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been discovered and corrected in openssl:

The dtls1_get_message_fragment function in d1_both.c in OpenSSL before
0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote
attackers to cause a denial of service (recursion and client crash)
via a DTLS hello message in an invalid DTLS handshake (CVE-2014-0221).

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before
1.0.1h does not properly restrict processing of ChangeCipherSpec
messages, which allows man-in-the-middle attackers to trigger use of a
zero-length master key in certain OpenSSL-to-OpenSSL communications,
and consequently hijack sessions or obtain sensitive information,
via a crafted TLS handshake, aka the CCS Injection vulnerability
(CVE-2014-0224).

The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL
before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when
an anonymous ECDH cipher suite is used, allows remote attackers to
cause a denial of service (NULL pointer dereference and client crash)
by triggering a NULL certificate value (CVE-2014-3470).

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
http://www.openssl.org/news/secadv_20140605.txt
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
ef1687f8f4d68dd34149dbb04f3fccda
mes5/i586/libopenssl0.9.8-0.9.8h-3.18mdvmes5.2.i586.rpm
3e46ee354bd0add0234eaf873f0a076c
mes5/i586/libopenssl0.9.8-devel-0.9.8h-3.18mdvmes5.2.i586.rpm
0cc60393474d11a3786965d780e39ebc
mes5/i586/libopenssl0.9.8-static-devel-0.9.8h-3.18mdvmes5.2.i586.rpm
16d367fe394b2f16b9f022ea7ba75a54
mes5/i586/openssl-0.9.8h-3.18mdvmes5.2.i586.rpm
223a4a6b80f1b2eb3cbfaf99473423f3
mes5/SRPMS/openssl-0.9.8h-3.18mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
85a51b41a45f6905ea778347d8b236c1
mes5/x86_64/lib64openssl0.9.8-0.9.8h-3.18mdvmes5.2.x86_64.rpm
d0bf9ef6c6e33d0c6158add14cbe04b8
mes5/x86_64/lib64openssl0.9.8-devel-0.9.8h-3.18mdvmes5.2.x86_64.rpm
707842b93162409157667f696996f4fc
mes5/x86_64/lib64openssl0.9.8-static-devel-0.9.8h-3.18mdvmes5.2.x86_64.rpm
70f4de1608d99c970afa1786595a761d
mes5/x86_64/openssl-0.9.8h-3.18mdvmes5.2.x86_64.rpm
223a4a6b80f1b2eb3cbfaf99473423f3
mes5/SRPMS/openssl-0.9.8h-3.18mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTlcOfmqjQ0CJFipgRAj2XAJ0ZZpPmhFDRDja0146szOkK/8mqYwCfTV4s
D5C6zRDfJm1loSlN9RoOzgE=
=JhLX
-----END PGP SIGNATURE-----


------------=_1402335211-30545-0
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1402335211-30545-0--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung