Mehrere Probleme in OpenSSL
ID: | USN-2308-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 14.04 LTS |
Datum: | Do, 7. August 2014, 23:23 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139 |
Applikationen: | OpenSSL |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============7039890283028114065== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="dvgOOK7lD8Hih5AHbrHgJwg0jib2rw18V" This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --dvgOOK7lD8Hih5AHbrHgJwg0jib2rw18V Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-2308-1 August 07, 2014 openssl vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: Several security issues were fixed in OpenSSL. Software Description: - openssl: Secure Socket Layer (SSL) cryptographic library and tools Details: Adam Langley and Wan-Teh Chang discovered that OpenSSL incorrectly handled certain DTLS packets. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2014-3505) Adam Langley discovered that OpenSSL incorrectly handled memory when processing DTLS handshake messages. A remote attacker could use this issue to cause OpenSSL to consume memory, resulting in a denial of service. (CVE-2014-3506) Adam Langley discovered that OpenSSL incorrectly handled memory when processing DTLS fragments. A remote attacker could use this issue to cause OpenSSL to leak memory, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-3507) Ivan Fratric discovered that OpenSSL incorrectly leaked information in the pretty printing functions. When OpenSSL is used with certain applications, an attacker may use this issue to possibly gain access to sensitive information. (CVE-2014-3508) Gabor Tyukasz discovered that OpenSSL contained a race condition when processing serverhello messages. A malicious server could use this issue to cause clients to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-3509) Felix Gröbert discovered that OpenSSL incorrectly handled certain DTLS handshake messages. A malicious server could use this issue to cause clients to crash, resulting in a denial of service. (CVE-2014-3510) David Benjamin and Adam Langley discovered that OpenSSL incorrectly handled fragmented ClientHello messages. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could be used to force a protocol downgrade to TLS 1.0. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-3511) Sean Devlin and Watson Ladd discovered that OpenSSL incorrectly handled certain SRP parameters. A remote attacker could use this with applications that use SRP to cause a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-3512) Joonas Kuorilehto and Riku HietamÀki discovered that OpenSSL incorrectly handled certain Server Hello messages that specify an SRP ciphersuite. A malicious server could use this issue to cause clients to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-5139) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.5 Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.17 Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.20 After a standard system update you need to reboot your computer to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2308-1 CVE-2014-3505, CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3509, CVE-2014-3510, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139 Package Information: https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.5 https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.17 https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.20 --dvgOOK7lD8Hih5AHbrHgJwg0jib2rw18V Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJT481uAAoJEGVp2FWnRL6TfioP/jN/19oXnCOhdFvh4CTjepjv a+dT4ztm4iTcAtIVJJlBl36gETv9pS9hKSwL7AMSMlkDnhd8BEYj3y32y5V7Np9m 1f+lRwr8AL5PVEJpo1/cyspcq1cB/6Jtui+tO0NhzKtruS/3sIgrrLIY9VHaBudl NJmULyM8c2xUZAzzOH5AsplXrY2LW6hKBlblZYfStVKMyBirkwl6SrojbDspHkRR ews9mcsxeek98KIyx/Lg4JChUd5VNknRkYZJ2pXypRW2glNjkgZ1MR62tCINuM8m HxfQZTDDKoEnpPIIu2CAqtXBnLrLl94h1mC/adFytO7d2uNibeGCmMLersQcaN+g UrkKongRe2uVVrDDRHYeTw0zaeQ1/n81H1PyjQ8drhAC6xRljOYlgJtxcaIsYbbb YeFNUBqnlc4FJkV2gojm+O9szgvR2Qt8h5XtRGryaOUmq7EmygYsye2ISuAwi/LL U0F3JMVLl92nzI6RKfr6YmKJf+cHlqlauwYVJb0RQgKWpsYXTgVsSIJ1wSxDbcv9 wY1O6hFcc1ZlUN1WQZYNyByFQvMD0ooia/WIM0Z8EINMhzpPIYF7HVjC/21hahB7 uuGl463jUCGf8vrXGWhxYSDyGxcn2ywrjzkQyVuSUyy+uPnLXDkVGO0cm6Ntfq18 jgBLCNC0kxOcd9vR8khC =JGlF -----END PGP SIGNATURE----- --dvgOOK7lD8Hih5AHbrHgJwg0jib2rw18V-- --===============7039890283028114065== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============7039890283028114065==-- |