SB2015032004 - Multiple vulnerabilities in OpenSSL
Published: March 20, 2015 Updated: December 16, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2015-0207)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the dtls1_listen function in d1_lib.c. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
2) NULL pointer dereference (CVE-ID: CVE-2015-0208)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
3) Cryptographic issues (CVE-ID: CVE-2015-0285)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the ssl3_client_hello function in s3_clnt.c does not ensure that the PRNG is seeded before proceeding with a handshak. A remote attacker can gain unauthorized access to sensitive information on the system.
4) NULL pointer dereference (CVE-ID: CVE-2015-0290)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the multi-block feature in the ssl3_write_bytes function in s3_pkt.c. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
5) NULL pointer dereference (CVE-ID: CVE-2015-0291)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the sigalgs implementation in t1_lib.c. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://www.openssl.org/news/secadv_20150319.txt
- https://git.openssl.org/?p=openssl.git;a=commit;h=819418110b6fff4a7b96f01a5d68f71df3e3b736
- https://bugzilla.redhat.com/show_bug.cgi?id=1202351
- http://www.securitytracker.com/id/1031929
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- https://bto.bluecoat.com/security-advisory/sa92
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/73229
- https://security.gentoo.org/glsa/201503-11
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- https://git.openssl.org/?p=openssl.git;a=commit;h=4b22cce3812052fe64fc3f6d58d8cc884e3cb834
- https://bugzilla.redhat.com/show_bug.cgi?id=1202369
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://www.securityfocus.com/bid/73230
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://bugzilla.redhat.com/show_bug.cgi?id=1202410
- https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=e1b568dd2462f7cacf98f3d117936c34e2849a6b
- http://www.securityfocus.com/bid/73234
- http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015
- https://git.openssl.org/?p=openssl.git;a=commit;h=77c77f0a1b9f15b869ca3342186dfbedd1119d0e
- https://bugzilla.redhat.com/show_bug.cgi?id=1202345
- http://www.securityfocus.com/bid/73226
- https://git.openssl.org/?p=openssl.git;a=commit;h=76343947ada960b6269090638f5391068daee88d
- https://bugzilla.redhat.com/show_bug.cgi?id=1202338
- http://www.securityfocus.com/bid/73235
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf