Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Networking
    • Servers

    OpenSSL Fixes Six Flaws in the Secure Sockets Layer Protocol Tool

    Written by

    Fahmida Y. Rashid
    Published January 6, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      OpenSSL has fixed six security vulnerabilities and updated both 1.0.0 and 0.9.8 versions of the open-source implementation of the Secure Sockets Layer protocol.

      The vulnerabilities fixed in versions 1.0.0.f and 0.9.8s include a plain text recovery attack that is publicly known, policy check failures and problems with buffers not being cleared before being reused, according to a security advisory released Jan. 4 on OpenSSL.org. Four of the flaws affect both versions, according to the advisory.

      The most serious flaw, if exploited, could enable an efficient plain text recovery attack against the OpenSSL implementation of Datagram Transport Layer Security (DTLS) protocol, which protects server-client communications from tampering or forgery. The issue was discovered and publicized recently by Nadhem Alfardan and Kenny Paterson, security researchers from the Information Security Group at Royal Holloway at the University of London. The cipher-block chaining-based encryption weakness allows adversaries to exploit timing differences that arise during decryption processing and recover the plain text version of an encrypted message without needing the initial encryption key.

      The pair is scheduled to demonstrate their “padding Oracle attack” at the Network and Distributed System Security Symposium in February. This cryptographic issue was present in both versions of OpenSSL and has been fixed.

      Developers also fixed the issue in the way OpenSSL padded the SSL 3.0 records in CBC mode. In this mode, the entire plain text block has to be encrypted, and if it’s incomplete, padded to fill up the block before being encrypted. It turned out that the bytes being padded weren’t being initialized, so potentially sensitive data from a previous transaction was left behind and being encrypted with the new data. The uninitialized contents of memory could contain anything, including the plain text of other connections to the server. This issue affected both clients and servers that accept SSL 3.0 handshakes.

      “As a result, in each record, up to 15 bytes of uninitialized memory may be sent, encrypted, to the SSL peer. This could include sensitive contents of previously freed memory,” the advisory said.

      However, the severity of the issue is limited because most OpenSSL servers use a single memory buffer for a given connection and the initial content is usually public handshake data. And the exposed memory buffer is already filled with non-sensitive data, according to the advisory.

      The policy check failure flaw affected only the 0.9.8 branch of OpenSSL. Discovered by the OpenSSL team, the memory allocation bug is triggered only if a specific policy check flag is set and can result in code crashes, which then can also lead to a denial of service (DoS).

      Three other vulnerabilities that can lead to a DoS condition were also addressed. One issue, in which an assertion failure can be triggered by malformed RFC 3779 data being included in certificates, is not part of a standard implementation, according to the advisory. In the standard release of OpenSSL, support for RFC 3779 is disabled by default.

      Other DoS bugs included problems in handshake restarts for server-gated cryptography and the lack of error-checking to catch invalid parameters for the GOST hash function.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.