Menu
OpenSSL patches eight new vulnerabilities

OpenSSL patches eight new vulnerabilities

The flaws are of moderate and low severity, but server admins should still update

Server administrators are advised to upgrade OpenSSL again to fix eight new vulnerabilities, two of which can lead to denial-of-service (DoS) attacks.

The flaws are only of moderate and low severity, unlike the Heartbleed vulnerability discovered last year. Heartbleed could have allowed attackers to steal sensitive information including encryption keys from servers.

Nevertheless, "system administrators should plan to upgrade their running OpenSSL server instances in the coming days," said Tod Beardsley, engineering manager at vulnerability intelligence firm Rapid7, via email Friday.

The newly released OpenSSL versions are 1.0.1k, 1.0.0p and 0.9.8zd.

Two denial-of-service vulnerabilities, tracked as CVE-2014-3571 and CVE-2015-0206, only affect OpenSSL's implementation of the DTLS (Datagram Transport Layer Security) protocol, which is not as widely used as the TLS (Transport Layer Security) protocol.

DTLS provides encrypted communications over datagram protocols such as UDP and is used for things like VPN (Virtual Private Networks) and WebRTC (Web Real-Time Communication).

"In order to maintain reliable service, OpenSSL should be upgraded or replaced by SSL libraries not affected by these issues, such as LibreSSL," Beardsley said.

Other flaws do apply to TLS and can lead to unexpected behavior when OpenSSL is built with the no-ssl3 option, a situation where the server accepts DH certificates for client authentication without the certificate verify message and a case where a client accepts an ECDH handshake despite a missing server key exchange message, which removes the forward secrecy property of the ciphersuite.

"We are still looking into the issues disclosed today," Beardsley said. "While these vulnerabilities do not appear to lead to remote code execution or information disclosure, we will let the OpenSSL team know if we find any new, unexpected vectors of attack."


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags online safetypatchesExploits / vulnerabilitiesRapid7

Events

Featured

Slideshows

Channel kicks 2021 into gear as After Hours returns to Auckland

Channel kicks 2021 into gear as After Hours returns to Auckland

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Pantry at Park Hyatt in Auckland to kick-start 2021.

Channel kicks 2021 into gear as After Hours returns to Auckland
The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

Hundreds of leaders from the New Zealand IT industry gathered at the Hilton in Auckland on 17 November to celebrate the finest female talent in the Kiwi channel and recognise the winners of the Reseller News Women in ICT Awards (WIICTA) 2020.

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards
Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards

Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards

The leading female front runners of the New Zealand ICT industry joined together for the annual Reseller News Women in ICT Awards event at the Hilton in Auckland, during which hundreds of guests celebrated 13 outstanding individuals who won awards, chosen from more than 50 finalists representing over 30 organisations.

Leading female front runners honoured at the 2020 Reseller News Women in ICT Awards
Show Comments