exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

FreeBSD-SA-06-23.openssl.txt

FreeBSD-SA-06-23.openssl.txt
Posted Oct 4, 2006
Site freebsd.org

FreeBSD Security Advisory: Multiple problems in crypto(3)

tags | cryptography
systems | freebsd
SHA-256 | 0187927fa4f8bfa1d2e8ed32a2b55c51090ed0b77f08caa6a6f2abc617a0afaf

FreeBSD-SA-06-23.openssl.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=============================================================================
FreeBSD-SA-06:23.openssl Security Advisory
The FreeBSD Project

Topic: Multiple problems in crypto(3)

Category: contrib
Module: openssl
Announced: 2006-09-28
Credits: Dr S N Henson, Tavis Ormandy, Will Drewry
Affects: All FreeBSD releases.
Corrected: 2006-09-28 13:02:37 UTC (RELENG_6, 6.1-PRERELEASE)
2006-09-28 13:03:14 UTC (RELENG_6_1, 6.1-RELEASE-p8)
2006-09-28 13:03:41 UTC (RELENG_6_0, 6.0-RELEASE-p13)
2006-09-28 13:03:57 UTC (RELENG_5, 5.5-STABLE)
2006-09-28 13:04:16 UTC (RELENG_5_5, 5.5-RELEASE-p6)
2006-09-28 13:04:47 UTC (RELENG_5_4, 5.4-RELEASE-p20)
2006-09-28 13:05:08 UTC (RELENG_5_3, 5.3-RELEASE-p35)
2006-09-28 13:05:59 UTC (RELENG_4, 4.11-STABLE)
2006-09-28 13:06:23 UTC (RELENG_4_11, 4.11-RELEASE-p23)
CVE Name: CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-4343

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:http://security.FreeBSD.org/>.

I. Background

FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is
a collaborative effort to develop a robust, commercial-grade, full-featured,
and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols as well as a full-strength
general purpose cryptography library.

II. Problem Description

Several problems have been found in OpenSSL:

1. During the parsing of certain invalid ASN1 structures an error condition
is mishandled, possibly resulting in an infinite loop. [CVE-2006-2937]

2. A buffer overflow exists in the SSL_get_shared_ciphers function.
[CVE-2006-3738]

3. A NULL pointer may be dereferenced in the SSL version 2 client code.
[CVE-2006-4343]

In addition, many applications using OpenSSL do not perform any validation
of the lengths of public keys being used. [CVE-2006-2940]

III. Impact

Servers which parse ASN1 data from untrusted sources may be vulnerable to
a denial of service attack. [CVE-2006-2937]

An attacker accessing a server which uses SSL version 2 may be able to
execute arbitrary code with the privileges of that server. [CVE-2006-3738]

A malicious SSL server can cause clients connecting using SSL version 2 to
crash. [CVE-2006-4343]

Applications which perform public key operations using untrusted keys may
be vulnerable to a denial of service attack. [CVE-2006-2940]

IV. Workaround

No workaround is available, but not all of the vulnerabilities mentioned
affect all applications.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to 4-STABLE, 5-STABLE, or 6-STABLE,
or to the RELENG_6_1, RELENG_6_0, RELENG_5_5, RELENG_5_4, RELENG_5_3,
or RELENG_4_11 security branch dated after the correction date.

2) To patch your present system:

The following patches have been verified to apply to FreeBSD 4.11, 5.3,
5.4, 5.5, 6.0, and 6.1 systems.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch http://security.FreeBSD.org/patches/SA-06:23/openssl.patch
# fetch http://security.FreeBSD.org/patches/SA-06:23/openssl.patch.asc

b) Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile the operating system as described in
<URL: http://www.freebsd.org/handbook/makeworld.html> and reboot the
system.

NOTE: Any third-party applications, including those installed from the
FreeBSD ports collection, which are statically linked to libcrypto(3)
should be recompiled in order to use the corrected code.

NOTE ALSO: The above patch reduces the functionality of libcrypto(3) by
prohibiting the use of exceptionally large public keys. It is believed
that no existing applications legitimately use such key lengths as would
be affected by this change.

VI. Correction details

The following list contains the revision numbers of each file that was
corrected in FreeBSD.

Branch Revision
Path
- -------------------------------------------------------------------------
RELENG_4
src/crypto/openssl/crypto/asn1/tasn_dec.c 1.1.1.1.2.4
src/crypto/openssl/crypto/dh/dh.h 1.1.1.1.2.8
src/crypto/openssl/crypto/dh/dh_err.c 1.1.1.1.2.7
src/crypto/openssl/crypto/dh/dh_key.c 1.1.1.1.2.11
src/crypto/openssl/crypto/dsa/dsa.h 1.1.1.1.2.8
src/crypto/openssl/crypto/dsa/dsa_err.c 1.1.1.1.2.7
src/crypto/openssl/crypto/dsa/dsa_ossl.c 1.1.1.1.2.11
src/crypto/openssl/crypto/rsa/rsa.h 1.2.2.14
src/crypto/openssl/crypto/rsa/rsa_eay.c 1.2.4.16
src/crypto/openssl/crypto/rsa/rsa_err.c 1.1.1.1.2.7
src/crypto/openssl/ssl/s2_clnt.c 1.2.2.14
src/crypto/openssl/ssl/s3_srvr.c 1.1.1.1.2.20
src/crypto/openssl/ssl/ssl_lib.c 1.1.1.1.2.14
RELENG_4_11
src/UPDATING 1.73.2.91.2.24
src/sys/conf/newvers.sh 1.44.2.39.2.27
src/crypto/openssl/crypto/asn1/tasn_dec.c 1.1.1.1.2.2.6.1
src/crypto/openssl/crypto/dh/dh.h 1.1.1.1.2.4.8.1
src/crypto/openssl/crypto/dh/dh_err.c 1.1.1.1.2.3.8.1
src/crypto/openssl/crypto/dh/dh_key.c 1.1.1.1.2.7.6.1
src/crypto/openssl/crypto/dsa/dsa.h 1.1.1.1.2.4.8.1
src/crypto/openssl/crypto/dsa/dsa_err.c 1.1.1.1.2.3.8.1
src/crypto/openssl/crypto/dsa/dsa_ossl.c 1.1.1.1.2.7.6.1
src/crypto/openssl/crypto/rsa/rsa.h 1.2.2.8.4.1
src/crypto/openssl/crypto/rsa/rsa_eay.c 1.2.4.8.4.1
src/crypto/openssl/crypto/rsa/rsa_err.c 1.1.1.1.2.3.8.1
src/crypto/openssl/ssl/s2_clnt.c 1.2.2.8.4.1
src/crypto/openssl/ssl/s3_srvr.c 1.1.1.1.2.9.4.1
src/crypto/openssl/ssl/ssl_lib.c 1.1.1.1.2.8.4.1
RELENG_5
src/crypto/openssl/crypto/asn1/tasn_dec.c 1.1.1.2.4.1
src/crypto/openssl/crypto/dh/dh.h 1.1.1.6.6.1
src/crypto/openssl/crypto/dh/dh_err.c 1.1.1.4.6.2
src/crypto/openssl/crypto/dh/dh_key.c 1.1.1.8.4.2
src/crypto/openssl/crypto/dsa/dsa.h 1.1.1.6.6.2
src/crypto/openssl/crypto/dsa/dsa_err.c 1.1.1.4.6.1
src/crypto/openssl/crypto/dsa/dsa_ossl.c 1.1.1.7.4.2
src/crypto/openssl/crypto/rsa/rsa.h 1.10.4.2
src/crypto/openssl/crypto/rsa/rsa_eay.c 1.12.4.2
src/crypto/openssl/crypto/rsa/rsa_err.c 1.1.1.4.6.1
src/crypto/openssl/ssl/s2_clnt.c 1.12.2.2
src/crypto/openssl/ssl/s3_srvr.c 1.1.1.13.2.2
src/crypto/openssl/ssl/ssl_lib.c 1.1.1.11.2.2
RELENG_5_5
src/UPDATING 1.342.2.35.2.6
src/sys/conf/newvers.sh 1.62.2.21.2.8
src/crypto/openssl/crypto/asn1/tasn_dec.c 1.1.1.2.16.1
src/crypto/openssl/crypto/dh/dh.h 1.1.1.6.18.1
src/crypto/openssl/crypto/dh/dh_err.c 1.1.1.4.6.1.4.1
src/crypto/openssl/crypto/dh/dh_key.c 1.1.1.8.4.1.4.1
src/crypto/openssl/crypto/dsa/dsa.h 1.1.1.6.6.1.4.1
src/crypto/openssl/crypto/dsa/dsa_err.c 1.1.1.4.18.1
src/crypto/openssl/crypto/dsa/dsa_ossl.c 1.1.1.7.4.1.4.1
src/crypto/openssl/crypto/rsa/rsa.h 1.10.4.1.4.1
src/crypto/openssl/crypto/rsa/rsa_eay.c 1.12.4.1.4.1
src/crypto/openssl/crypto/rsa/rsa_err.c 1.1.1.4.18.1
src/crypto/openssl/ssl/s2_clnt.c 1.12.2.1.4.1
src/crypto/openssl/ssl/s3_srvr.c 1.1.1.13.2.1.4.1
src/crypto/openssl/ssl/ssl_lib.c 1.1.1.11.2.1.4.1
RELENG_5_4
src/UPDATING 1.342.2.24.2.29
src/sys/conf/newvers.sh 1.62.2.18.2.25
src/crypto/openssl/crypto/asn1/tasn_dec.c 1.1.1.2.8.1
src/crypto/openssl/crypto/dh/dh.h 1.1.1.6.10.1
src/crypto/openssl/crypto/dh/dh_err.c 1.1.1.4.6.1.2.1
src/crypto/openssl/crypto/dh/dh_key.c 1.1.1.8.4.1.2.1
src/crypto/openssl/crypto/dsa/dsa.h 1.1.1.6.6.1.2.1
src/crypto/openssl/crypto/dsa/dsa_err.c 1.1.1.4.10.1
src/crypto/openssl/crypto/dsa/dsa_ossl.c 1.1.1.7.4.1.2.1
src/crypto/openssl/crypto/rsa/rsa.h 1.10.4.1.2.1
src/crypto/openssl/crypto/rsa/rsa_eay.c 1.12.4.1.2.1
src/crypto/openssl/crypto/rsa/rsa_err.c 1.1.1.4.10.1
src/crypto/openssl/ssl/s2_clnt.c 1.12.2.1.2.1
src/crypto/openssl/ssl/s3_srvr.c 1.1.1.13.2.1.2.1
src/crypto/openssl/ssl/ssl_lib.c 1.1.1.11.2.1.2.1
RELENG_5_3
src/UPDATING 1.342.2.13.2.38
src/sys/conf/newvers.sh 1.62.2.15.2.40
src/crypto/openssl/crypto/asn1/tasn_dec.c 1.1.1.2.6.1
src/crypto/openssl/crypto/dh/dh.h 1.1.1.6.8.1
src/crypto/openssl/crypto/dh/dh_err.c 1.1.1.4.8.1
src/crypto/openssl/crypto/dh/dh_key.c 1.1.1.8.6.1
src/crypto/openssl/crypto/dsa/dsa.h 1.1.1.6.8.1
src/crypto/openssl/crypto/dsa/dsa_err.c 1.1.1.4.8.1
src/crypto/openssl/crypto/dsa/dsa_ossl.c 1.1.1.7.6.1
src/crypto/openssl/crypto/rsa/rsa.h 1.10.6.1
src/crypto/openssl/crypto/rsa/rsa_eay.c 1.12.6.1
src/crypto/openssl/crypto/rsa/rsa_err.c 1.1.1.4.8.1
src/crypto/openssl/ssl/s2_clnt.c 1.12.4.1
src/crypto/openssl/ssl/s3_srvr.c 1.1.1.13.4.1
src/crypto/openssl/ssl/ssl_lib.c 1.1.1.11.4.1
RELENG_6
src/crypto/openssl/crypto/asn1/tasn_dec.c 1.1.1.2.10.1
src/crypto/openssl/crypto/dh/dh.h 1.1.1.6.12.1
src/crypto/openssl/crypto/dh/dh_err.c 1.1.1.5.2.1
src/crypto/openssl/crypto/dh/dh_key.c 1.1.1.9.2.1
src/crypto/openssl/crypto/dsa/dsa.h 1.1.1.7.2.1
src/crypto/openssl/crypto/dsa/dsa_err.c 1.1.1.4.12.1
src/crypto/openssl/crypto/dsa/dsa_ossl.c 1.1.1.8.2.1
src/crypto/openssl/crypto/rsa/rsa.h 1.11.2.1
src/crypto/openssl/crypto/rsa/rsa_eay.c 1.13.2.1
src/crypto/openssl/crypto/rsa/rsa_err.c 1.1.1.4.12.1
src/crypto/openssl/ssl/s2_clnt.c 1.13.2.1
src/crypto/openssl/ssl/s3_srvr.c 1.1.1.14.2.1
src/crypto/openssl/ssl/ssl_lib.c 1.1.1.12.2.1
RELENG_6_1
src/UPDATING 1.416.2.22.2.10
src/sys/conf/newvers.sh 1.69.2.11.2.10
src/crypto/openssl/crypto/asn1/tasn_dec.c 1.1.1.2.14.1
src/crypto/openssl/crypto/dh/dh.h 1.1.1.6.16.1
src/crypto/openssl/crypto/dh/dh_err.c 1.1.1.5.6.1
src/crypto/openssl/crypto/dh/dh_key.c 1.1.1.9.6.1
src/crypto/openssl/crypto/dsa/dsa.h 1.1.1.7.6.1
src/crypto/openssl/crypto/dsa/dsa_err.c 1.1.1.4.16.1
src/crypto/openssl/crypto/dsa/dsa_ossl.c 1.1.1.8.6.1
src/crypto/openssl/crypto/rsa/rsa.h 1.11.6.1
src/crypto/openssl/crypto/rsa/rsa_eay.c 1.13.6.1
src/crypto/openssl/crypto/rsa/rsa_err.c 1.1.1.4.16.1
src/crypto/openssl/ssl/s2_clnt.c 1.13.6.1
src/crypto/openssl/ssl/s3_srvr.c 1.1.1.14.6.1
src/crypto/openssl/ssl/ssl_lib.c 1.1.1.12.6.1
RELENG_6_0
src/UPDATING 1.416.2.3.2.18
src/sys/conf/newvers.sh 1.69.2.8.2.14
src/crypto/openssl/crypto/asn1/tasn_dec.c 1.1.1.2.12.1
src/crypto/openssl/crypto/dh/dh.h 1.1.1.6.14.1
src/crypto/openssl/crypto/dh/dh_err.c 1.1.1.5.4.1
src/crypto/openssl/crypto/dh/dh_key.c 1.1.1.9.4.1
src/crypto/openssl/crypto/dsa/dsa.h 1.1.1.7.4.1
src/crypto/openssl/crypto/dsa/dsa_err.c 1.1.1.4.14.1
src/crypto/openssl/crypto/dsa/dsa_ossl.c 1.1.1.8.4.1
src/crypto/openssl/crypto/rsa/rsa.h 1.11.4.1
src/crypto/openssl/crypto/rsa/rsa_eay.c 1.13.4.1
src/crypto/openssl/crypto/rsa/rsa_err.c 1.1.1.4.14.1
src/crypto/openssl/ssl/s2_clnt.c 1.13.4.1
src/crypto/openssl/ssl/s3_srvr.c 1.1.1.14.4.1
src/crypto/openssl/ssl/ssl_lib.c 1.1.1.12.4.1
- -------------------------------------------------------------------------

VII. References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343

The latest revision of this advisory is available at
http://security.FreeBSD.org/advisories/FreeBSD-SA-06:23.openssl.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (FreeBSD)

iD8DBQFFG8l8FdaIBMps37IRAn0pAKCRuDXjFm2w7YtoZ9C6oVgM9UK0GgCdHdYu
7owfMI1ZVr22prZNmPTeM7k=
=DguL
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close