Vulnerabilities in the OpenSSL library

OpenSSL is a widely-used open source code implementation of SSL (Secure Sockets Layer), TLS (Transport Layer Security) and DTLS (Datagram Transport Layer Security) protocols, as well as an encryption library. OpenSSL is used e.g. for https implementations of web servers, as well as for encrypting message traffic of e-mail services between a customer computer and server. 7 vulnerabilities have been detected in the OpenSSL library.

The most severe vulnerability (CVE-2014-0224) may enable a Man-in-the-Middle (MITM) attack. The vulnerability is linked to the processing of the library's Change Cipher Spec protocol messages. If the message in question is conveyed between a vulnerable customer and vulnerable server before the key material has been changed, the connection is encrypted by using easy-to-guess key material. By exploiting the vulnerability, the attacker, in the role of man-in-the-middle, is able to read and edit the content of encrypted messages. A successful attack requires that the attacker is able to listen in on and modify the target's network traffic. Therefore, in order to perform a MITM attack, the attacker must have access to the LAN or wireless network to which the victim's computer is connected.

Two vulnerabilities (CVE-2014-0221 and CVE-2014-0195) are linked to the processing of DTLS protocol messages. In the first vulnerability, a handshake packet formulated in a certain way can cause a denial-of-service for the DTLS customer. In the second vulnerability, the attacker can execute a preferred program code in the target system by sending a DTLS fragment formulated in a certain way.

Two vulnerabilities (CVE-2014-0198 and CVE-2010-5298) are linked to the software that have used the SSL_MODE_RELEASE_BUFFERS parametre which is not included in the default settings of the recursion. The vulnerabilities enable that the attacker can cause a denial-of-service in the target system or insert data from one encrypted session to another.

One vulnerability (CVE-2014-3470) is linked to the SSL/TLS customers who use anonymous ECDH (Elliptic curve Diffie–Hellman) encryption methods. The vulnerability enables that the attacker can cause a denial-of-service in the target system.

An update for the vulnerability CVE-2014-0076 patches a so-called FLUSH+RELOAD side-channel vulnerability in the OpenSSL series 1.0.0 and 0.9.8.

  • Servers and server applications
  • Workstations and end-user applications
  • Network devices
  • Mobile communications systems
  • Embedded systems
  • Others

Target

  • Servers and server applications
  • Workstations and end-user applications
  • Network devices
  • Mobile communications systems
  • Embedded systems
Further information +

Attack vector

  • No authentication required
  • Remote
  • No user interaction required
Further information on the access vector +

Impact

  • Editing of information
  • Obtaining of confidential information
  • Security bypass
Further information on the impact +

Remediation

  • Software update patch
Further information on the remediation +

Vulnerable software:

  • OpenSSL 1.0.1g and previous versions
  • OpenSSL 1.0.0l and previous versions
  • OpenSSL 0.9.8y and previous versions

Possible solutions and restrictive measures:

Upgrade the vulnerable software in accordance with the vendor's instructions. For the users of Linux distributions, the best way to update is the update services provided by the distributor. A service using a vulnerable library must be restarted after the library update.

Further information:

https://www.openssl.org/news/secadv_20140605.txt

CVE-2014-0224

CVE-2014-0221

CVE-2014-0195

CVE-2014-0198

CVE-2010-5298

CVE-2014-3470

CVE-2014-0076

Update history


Key words: Information security, Vulnerabilities


LinkedIn Print