CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

Ubuntu Security Notification for Openssl Vulnerabilities (USN-3087-1)

2016年9月24日 1324点热度 0人点赞 0条评论

漏洞类别:Ubuntu

漏洞等级:

漏洞信息

It was discovered that OpenSSL incorrectly handled the OCSP Status Request extension.

It was discovered that OpenSSL used undefined behaviour when performing pointer arithmetic.

It was discovered that OpenSSL did not properly use constant-time operations when performing DSA signing.

It was discovered that OpenSSL did not properly restrict the lifetime of queue entries in the DTLS implementation.

It was discovered that OpenSSL incorrectly handled memory in the TS_OBJ_print_bio() function.

It was discovered that the OpenSSL incorrectly handled the DTLS anti-replay feature.

It was discovered that OpenSSL incorrectly validated division results.

It was discovered that the DES and Triple DES ciphers were vulnerable to birthday attacks.

It was discovered that OpenSSL incorrectly handled certain ticket lengths.

It was discovered that OpenSSL incorrectly handled memory in the MDC2_Update() function.

It was discovered that OpenSSL incorrectly performed certain message length checks.

漏洞危害

A remote attacker could possibly use this issue to cause memory consumption, resulting in a denial of service. (CVE-2016-6304)

A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue has only been addressed in Ubuntu 16.04 LTS in this update. (CVE-2016-2177)

A remote attacker could possibly use this issue to perform a cache-timing attack and recover private DSA keys. (CVE-2016-2178)

A remote attacker could possibly use this issue to consume memory, resulting in a denial of service. (CVE-2016-2179)

A remote attacker could possibly use this issue to cause a denial of service. (CVE-2016-2180)

A remote attacker could possibly use this issue to cause a denial of service. (CVE-2016-2181)

A remote attacker could possibly use this issue to cause a denial of service. (CVE-2016-2182)

A remote attacker could possibly use this flaw to obtain clear text data from long encrypted sessions. This update moves DES from the HIGH cipher list to MEDIUM. (CVE-2016-2183)

A remote attacker could use this issue to cause a denial of service. (CVE-2016-6302)

A remote attacker could possibly use this issue to cause a denial of service. (CVE-2016-6303)

A remote attacker could possibly use this issue to cause a denial of service. (CVE-2016-6306)

解决方案

Refer to Ubuntu advisory USN-3087-1 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

USN-3087-1: 12.04 (Precise) on src (libssl1.0.0)

USN-3087-1: 16.04 (Xenial) on src (libssl1.0.0)

USN-3087-1: 14.04 (Kylin) on src (libssl1.0.0)

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me