Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
Data Security
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
OpenSSL Patches 7 Security Flaws -- 2 Critical
OpenSSL Patches 7 Security Flaws -- 2 Critical

By Linda Rosencrance
June 5, 2014 3:02PM

    Bookmark and Share
The critical SSL/TLS MiTM (man-in-the-middle) flaw, one of seven patched by the OpenSSL Project, has been around for over 16 years -- since the first release of OpenSSL. The reason the bug was so elusive: the code reviews were insufficient. The OpenSSL team said the MiTM attack can only be performed if both the client and the server are vulnerable.
 



If there is any good news from the discovery of the Heartbleed bug that affects OpenSSL, it’s this: security analysts are keeping a closer watch on OpenSSL. And their efforts have paid off. The open-source OpenSSL Project today released a security update that fixes seven vulnerabilities, including two that have been rated critical by the SANS Internet Storm Center.

The first critical flaw is the SSL/TLS MiTM flaw (CVE-2014-0224). “An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers,” according to the OpenSSL team's update. “This can be exploited by a man-in-the-middle (MiTM) attack where the attacker can decrypt and modify traffic from the attacked client and server.”

Around for 16 Years

The flaw was discovered by researcher Masashi Kikuchi of Lepidum Co. Ltd., who noted in a blog post that it had been around for over 16 years -- since the very first release of OpenSSL.

“The biggest reason why the bug hasn’t been found for over 16 years is that code reviews were insufficient, especially from experts who had experiences with TLS/SSL implementation,” he said in the post. “If the reviewers had enough experiences, they should have verified OpenSSL code in the same way they do their own code. They could have detected the problem.”

The OpenSSL team said the MiTM attack can only be performed if both the client and the server are vulnerable. OpenSSL clients are vulnerable in all versions of OpenSSL, while servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 should upgrade as a precaution.

Critical Flaw #2

The other OpenSSL vulnerability rated as critical by the SANS Internet Storm Center (ISC) is for the flaw identified as CVE-2014-0195. It is a Datagram Transport Layer Security (DTLS) invalid fragment vulnerability that was first reported to the OpenSSL Project on April 23.

“A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server,” according to the OpenSSL advisory. “This is potentially exploitable to run arbitrary code on a vulnerable client or server. Only applications using OpenSSL as a DTLS client or server affected.”

Another DTLS Flaw and More

DTLS can wreak even more havoc because it’s behind the CVE-2014-0221 vulnerability, which is a DTLS handshake recursion flaw -- rated important by SANS ISC. “By sending an invalid DTLS handshake to an OpenSSL DTLS client, the code can be made to recurse, eventually crashing in a DoS (deinal-of-service) attack,” according to the OpenSSL update. “Only applications using OpenSSL as a DTLS client are affected.” (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:

Linus:

Posted: 2014-06-09 @ 10:25am PT
If you are running Windows servers, you have bigger problems.

n/a:

Posted: 2014-06-05 @ 6:30pm PT
OpenSSL is a dead end. LibreSSL from the OpenBSD project is a hope for a better future.

Ezra Taylor:

Posted: 2014-06-05 @ 5:44pm PT
How do we know if we are using Openssl with DTLS?

Libstein:

Posted: 2014-06-05 @ 5:18pm PT
Stunning. Such security protocols should be tested against the best hackers in the world before release. If internet fraud carried a mandatory 20 year sentence, we could let all the pot smokers out to make room for the guys who steal money on the internet.

MikeOnline:

Posted: 2014-06-05 @ 3:56pm PT
"IT managers should ensure they patch their Linux systems"

OpenSSL is available for Windows too, and is bundled or embedded within numerous client and server applications. Patching Linux systems is insufficient.



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Data Security
1.   Juniper DDoS for High-IQ Networks
2.   Google Hacker Team to Hunt Bugs
3.   Cloud Firms Offer Azure Starter Kit
4.   FBI Cyber-Expert's Humble Start
5.   Chinese Hackers Hit U.S. Officials


advertisement
Gartner Rates IT Security Companies
IBM, HP, McAfee, Splunk ranked well.
Average Rating:
Hackers Target Western Energy Firms
Appears to be state-sponsored group.
Average Rating:
IBM Uncovers Android Security Flaw
Ten percent of devices at risk.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Juniper DDoS Solution Aims at High-IQ Networks
In the face of more complex attacks, Juniper Networks is boosting its DDoS Secure solution to help companies mitigate the threats with more effective security intelligence throughout the network fabric.
 
Large-Volume DDoS Attacks Hit Record in 2014
The number of distributed denial-of-service (DDoS) attacks set a record in the first half of 2014, according to a report by Arbor Networks. The number of attacks over 20 GB/sec doubled.
 
U.N.: Nations Hide Rise in Private Digital Snooping
Governments on every continent are hiding an increasing reliance on private companies to snoop on citizens' digital lives, the U.N. human rights office says, with grave concerns about privacy.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.