Ubuntu: OpenSSL vulnerabilities


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Ubuntu: OpenSSL vulnerabilities
# 1  
Old 06-26-2008
Ubuntu: OpenSSL vulnerabilities

LinuxSecurity.com: It was discovered that OpenSSL was vulnerable to a double-free when using TLS server extensions. A remote attacker could send a crafted packet and cause a denial of service via application crash in applications linked against OpenSSL. Ubuntu 8.04 LTS does not compile TLS server extensions by default. (CVE-2008-0891) It was discovered that OpenSSL could dereference a NULL pointer. If a user or automated system were tricked into connecting to a malicious server with particular cipher suites, a remote attacker could cause a denial of service via application crash. (CVE-2008-1672)

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. Red Hat

Openssl vulnerabilities

Hi there, The following openssl package are installed on the machine (openssl-1.0.0-27.el6_4.2.x86_64). It isn't the last version but I need to known if this content Vulnerabilities... How to check that on RedHat? Could you please tell me how to find this information?? Thankx (3 Replies)
Discussion started by: hiero_nymus
3 Replies

2. Solaris

Solaris v Ubuntu using OpenSSL paste problem

Hello, I hope this means something to someone. I have an odd problem that just started happening recently. I am not the system admin, so I don't have full info on any changes to the system lately. Except that I did upgrade OpenSSL to version 1.0.1.c from 1.0.0j. Anyway, I am trying to... (4 Replies)
Discussion started by: jonycp
4 Replies
Login or Register to Ask a Question
SSL_COMP_add_compression_method(3)				      OpenSSL					SSL_COMP_add_compression_method(3)

NAME
SSL_COMP_add_compression_method - handle SSL/TLS integrated compression methods SYNOPSIS
#include <openssl/ssl.h> int SSL_COMP_add_compression_method(int id, COMP_METHOD *cm); DESCRIPTION
SSL_COMP_add_compression_method() adds the compression method cm with the identifier id to the list of available compression methods. This list is globally maintained for all SSL operations within this application. It cannot be set for specific SSL_CTX or SSL objects. NOTES
The TLS standard (or SSLv3) allows the integration of compression methods into the communication. The TLS RFC does however not specify com- pression methods or their corresponding identifiers, so there is currently no compatible way to integrate compression with unknown peers. It is therefore currently not recommended to integrate compression into applications. Applications for non-public use may agree on certain compression methods. Using different compression methods with the same identifier will lead to connection failure. An OpenSSL client speaking a protocol that allows compression (SSLv3, TLSv1) will unconditionally send the list of all compression methods enabled with SSL_COMP_add_compression_method() to the server during the handshake. Unlike the mechanisms to set a cipher list, there is no method available to restrict the list of compression method on a per connection basis. An OpenSSL server will match the identifiers listed by a client against its own compression methods and will unconditionally activate com- pression when a matching identifier is found. There is no way to restrict the list of compression methods supported on a per connection basis. The OpenSSL library has the compression methods COMP_rle() and (when especially enabled during compilation) COMP_zlib() available. WARNINGS
Once the identities of the compression methods for the TLS protocol have been standardized, the compression API will most likely be changed. Using it in the current state is not recommended. RETURN VALUES
SSL_COMP_add_compression_method() may return the following values: 0 The operation succeeded. 1 The operation failed. Check the error queue to find out the reason. SEE ALSO
ssl(3) 0.9.7d 2004-05-17 SSL_COMP_add_compression_method(3)