Category: General remote services
Bugtraq ID: -
Service Modified: 06/06/2014
User Modified: -
Edited: No
PCI Vuln: Yes
THREAT:
The OpenSSL Project is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a general purpose cryptography library. OpenSSL contains the following vulnerabilities:
CVE-2014-0224: An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server.
CVE-2014-0221: By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. Only applications using OpenSSL as a DTLS client are affected.
CVE-2014-0195: A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Only applications using OpenSSL as a DTLS client or server affected.
CVE-2014-3470: OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack.
Affected Versions: OpenSSL 0.9.8 through 0.9.8za OpenSSL 1.0.0 through 1.0.0m. OpenSSL 1.0.1 through 1.0.1h.
IMPACT:
Depending on the vulnerability being exploited, an unauthenticated, remote attacker could conduct man-in-the-middle attacks, run arbitrary code or cause a denial of service condition on the targeted system.