Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
UCS Invicta: Integrated Flash
Deploy flash memory technology to
deliver peak workload performance.

Find out more>>
Network Security
Is your endpoint data protected?
Average Rating:
Rate this article:  
OpenSSL Patches 7 Security Flaws -- 2 Critical
OpenSSL Patches 7 Security Flaws -- 2 Critical

By Linda Rosencrance
June 5, 2014 3:02PM

    Bookmark and Share
The critical SSL/TLS MiTM (man-in-the-middle) flaw, one of seven patched by the OpenSSL Project, has been around for over 16 years -- since the first release of OpenSSL. The reason the bug was so elusive: the code reviews were insufficient. The OpenSSL team said the MiTM attack can only be performed if both the client and the server are vulnerable.
 


If there is any good news from the discovery of the Heartbleed bug that affects OpenSSL, it’s this: security analysts are keeping a closer watch on OpenSSL. And their efforts have paid off. The open-source OpenSSL Project today released a security update that fixes seven vulnerabilities, including two that have been rated critical by the SANS Internet Storm Center.

The first critical flaw is the SSL/TLS MiTM flaw (CVE-2014-0224). “An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers,” according to the OpenSSL team's update. “This can be exploited by a man-in-the-middle (MiTM) attack where the attacker can decrypt and modify traffic from the attacked client and server.”

Around for 16 Years

The flaw was discovered by researcher Masashi Kikuchi of Lepidum Co. Ltd., who noted in a blog post that it had been around for over 16 years -- since the very first release of OpenSSL.

“The biggest reason why the bug hasn’t been found for over 16 years is that code reviews were insufficient, especially from experts who had experiences with TLS/SSL implementation,” he said in the post. “If the reviewers had enough experiences, they should have verified OpenSSL code in the same way they do their own code. They could have detected the problem.”

The OpenSSL team said the MiTM attack can only be performed if both the client and the server are vulnerable. OpenSSL clients are vulnerable in all versions of OpenSSL, while servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 should upgrade as a precaution.

Critical Flaw #2

The other OpenSSL vulnerability rated as critical by the SANS Internet Storm Center (ISC) is for the flaw identified as CVE-2014-0195. It is a Datagram Transport Layer Security (DTLS) invalid fragment vulnerability that was first reported to the OpenSSL Project on April 23.

“A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server,” according to the OpenSSL advisory. “This is potentially exploitable to run arbitrary code on a vulnerable client or server. Only applications using OpenSSL as a DTLS client or server affected.”

Another DTLS Flaw and More

DTLS can wreak even more havoc because it’s behind the CVE-2014-0221 vulnerability, which is a DTLS handshake recursion flaw -- rated important by SANS ISC. “By sending an invalid DTLS handshake to an OpenSSL DTLS client, the code can be made to recurse, eventually crashing in a DoS (deinal-of-service) attack,” according to the OpenSSL update. “Only applications using OpenSSL as a DTLS client are affected.”

Another vulnerability rated important by SANS ISC is SSL_MODE_RELEASE_BUFFERS NULL pointer dereference (CVE-2014-0198). “A flaw in the do_ssl3_write function can allow remote attackers to cause a denial of service via a NULL pointer dereference,” the advisory noted. “This flaw only affects OpenSSL 1.0.0 and 1.0.1 where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common.”

The SSL_MODE_RELEASE_BUFFERS session injection or denial of service flaw (CVE-2010-5298) is a race condition in the ssl3_read_bytes function that can allow remote attackers to inject data across sessions or cause a denial of service. “This flaw only affects multithreaded applications using OpenSSL 1.0.0 and 1.0.1, where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common,” according to the OpenSSL team.

The OpenSSL Project is also providing patches for the CVE-2014-3470 vulnerability, which is an Anonymous Elliptic Curve Diffie Hellman (ECDH) DoS problem, and the CVE-2014-0076 flaw.

To mitigate the risks of these vulnerabilities, IT managers should ensure they patch their Linux systems as soon as possible.
 

Tell Us What You Think
Comment:

Name:

Linus:

Posted: 2014-06-09 @ 10:25am PT
If you are running Windows servers, you have bigger problems.

n/a:

Posted: 2014-06-05 @ 6:30pm PT
OpenSSL is a dead end. LibreSSL from the OpenBSD project is a hope for a better future.

Ezra Taylor:

Posted: 2014-06-05 @ 5:44pm PT
How do we know if we are using Openssl with DTLS?

Libstein:

Posted: 2014-06-05 @ 5:18pm PT
Stunning. Such security protocols should be tested against the best hackers in the world before release. If internet fraud carried a mandatory 20 year sentence, we could let all the pot smokers out to make room for the guys who steal money on the internet.

MikeOnline:

Posted: 2014-06-05 @ 3:56pm PT
"IT managers should ensure they patch their Linux systems"

OpenSSL is available for Windows too, and is bundled or embedded within numerous client and server applications. Patching Linux systems is insufficient.



Get Powerful App Acceleration with Cisco. In a world where time is money, you need to accelerate the speed at which data moves through your data center. Cisco UCS Invicta delivers powerful, easy-to-manage application acceleration for data-intensive workloads. So you can make decisions faster and outpace the competition. Learn More.


 Network Security
1.   Microsoft Ruling Raises Privacy Concern
2.   Twitter Buys Password Manager Mitro
3.   Gov't User Data Requests Skyrocket
4.   Retailers Hacked by New Malware
5.   IBM Beefs Up Identity Intelligence


advertisement
Twitter Buys Password Manager Mitro
Startup to release code as open source.
Average Rating:
Gov't User Data Requests Skyrocket
Twitter: From U.S. and around the globe.
Average Rating:
IBM Beefs Up Identity Intelligence
To offer biz better security products.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Ruling Against Microsoft Raises E-Mail Privacy Concern
Microsoft has been ordered to hand over e-mails to law enforcers in the United States as part of a criminal investigation, even though the e-mail is stored at a data center in Dublin,Ireland.
 
Twitter Buys Password Manager Startup Mitro
Following on the heels of another acquisition earlier this week, Twitter is adding to its fold a password-manager security startup called Mitro, which in turn is releasing its code as open source.
 
Government Requests for Customer Data Skyrocket
Requests for customer data from the government jumped 50 percent in the first half of 2014, according to Twitter, which received more than 2,000 requests for user info from gov't agencies.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.