Jump to content

Advisories MDKSA-2006:172: Updated openssl packages fix vulnerabilities


paul
 Share

Recommended Posts

Dr S N Henson of the OpenSSL core team and Open Network Security

recently developed an ASN1 test suite for NISCC (www.niscc.gov.uk).

When the test suite was run against OpenSSL two denial of service

vulnerabilities were discovered.

 

During the parsing of certain invalid ASN1 structures an error

condition is mishandled. This can result in an infinite loop which

consumes system memory. (CVE-2006-2937)

 

Certain types of public key can take disproportionate amounts of time

to process. This could be used by an attacker in a denial of service

attack. (CVE-2006-2940)

 

Tavis Ormandy and Will Drewry of the Google Security Team discovered a

buffer overflow in the SSL_get_shared_ciphers utility function, used by

some applications such as exim and mysql. An attacker could send a

list of ciphers that would overrun a buffer. (CVE-2006-3738)

 

Tavis Ormandy and Will Drewry of the Google Security Team discovered a

possible DoS in the sslv2 client code. Where a client application uses

OpenSSL to make a SSLv2 connection to a malicious server that server

could cause the client to crash. (CVE-2006-4343)

 

Updated packages are patched to address these issues.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...