Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA394] DSA-394-1 openssl095


Vulnerability Assessment Details

[DSA394] DSA-394-1 openssl095

Vulnerability Assessment Summary
DSA-394-1 openssl095

Detailed Explanation for this Vulnerability Assessment

Steve Henson of the OpenSSL core team identified and prepared fixes
for a number of vulnerabilities in the OpenSSL ASN1 code that were
discovered after running a test suite by British National
Infrastructure Security Coordination Centre (NISCC).
A bug in OpenSSLs SSL/TLS protocol was also identified which causes
OpenSSL to parse a client certificate from an SSL/TLS client when it
should reject it as a protocol error.
The Common Vulnerabilities and Exposures project identifies the
following problems:
Integer overflow in OpenSSL that permits remote attackers to cause a
denial of service (crash) via an SSL client certificate with
certain ASN.1 tag values.
OpenSSL does not properly track the number of characters in certain
ASN.1 inputs, which permits remote attackers to cause a denial of
service (crash) via an SSL client certificate that causes OpenSSL
to read past the end of a buffer when the long form is used.
Double-free vulnerability permits remote attackers to cause a denial
of service (crash) and possibly execute arbitrary code via an SSL
client certificate with a certain invalid ASN.1 encoding. This bug
was only present in OpenSSL 0.9.7 and is listed here only for
reference.
For the stable distribution (woody) this problem has been
fixed in openssl095 version 0.9.5a-6.woody.3.
This package is not present in the unstable (sid) or testing (sarge)
distribution.
We recommend that you upgrade your libssl095a packages and restart
services using this library. Debian doesn't ship any packages that
are linked against this library.
The following commandline (courtesy of Ray Dassen) produces a list of
names of running processes that have libssl095 mapped into their
memory space:

find /proc -name maps -exec egrep -l 'libssl095' {} /dev/null \
| sed -e 's/[^0-9]//g' | xargs --no-run-if-empty ps --no-headers -p | sed -e 's/^\+//' -e 's/ \+/ /g' | cut -d ' ' -f 5 | sort | uniq


You should restart the associated services.


Solution : http://www.debian.org/security/2003/dsa-394
Network Security Threat Level: High

Networks Security ID: 8732

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Diode Matrix Array ...Used for IBM and Univac mainframe Core Memory. 1960s.
$24.0
Diode Matrix Array ...Used for IBM and Univac mainframe Core Memory.  1960s. pictureVintage IBM System 360 370 mainframe operator and other equip lights lamps bulbs
$48.95
Vintage IBM System 360 370 mainframe operator and other equip lights lamps bulbs pictureGreat Mother of z/OS ----> IBM 370 Mainframe OS on PC ----> myMVS
$14.95
Great Mother of z/OS  ---->  IBM 370 Mainframe OS on PC ----> myMVS pictureIBM 3370/3390 disk platter from 1980's mainframe hard drive 14 inch diameter 1/8
$400.0
IBM 3370/3390 disk platter from 1980's mainframe hard drive 14 inch diameter 1/8 picture


Discussions

No Discussions have been posted on this vulnerability.