U radu programskog paketa OpenSSL primjećene su tri nepravilnosti. Udaljeni napadači mogu iskoristiti te ranjivosti kako bi izvršili napad uskraćivanja usluga (eng. Denial of Service).
Paket:
OpenSSL 0.x
Operacijski sustavi:
Ubuntu Linux 8.04, Ubuntu Linux 10.04, Ubuntu Linux 11.04, Ubuntu Linux 11.10
Kritičnost:
7.5
Problem:
pogreška u programskoj funkciji
Iskorištavanje:
udaljeno
Posljedica:
uskraćivanje usluga (DoS)
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2006-7250, CVE-2012-1165, CVE-2012-2110
Izvorni ID preporuke:
USN-1424-1
Izvor:
Ubuntu
Problem:
Uočene su greške u programskim funkcijama "mime_hdr_cmp", "mime_param_cmp" i "asn1_d2i_read_bio".
Posljedica:
Navedene ranjivosti napadači mogu iskoristiti za napad uskraćivanja usluga (DoS).
Rješenje:
Preporuča se primjena službenih programskih rješenja.
==========================================================================
Ubuntu Security Notice USN-1424-1
April 19, 2012
openssl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
Summary:
An application using OpenSSL could be made to crash or run programs if it
opened a specially crafted file.
Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools
Details:
It was discovered that OpenSSL could be made to dereference a NULL pointer
when processing S/MIME messages. A remote attacker could use this to cause
a denial of service. These issues did not affect Ubuntu 8.04 LTS.
(CVE-2006-7250, CVE-2012-1165)
Tavis Ormandy discovered that OpenSSL did not properly perform bounds
checking when processing DER data via BIO or FILE functions. A remote
attacker could trigger this flaw in services that used SSL to cause a
denial of service or possibly execute arbitrary code with application
privileges. (CVE-2012-2110)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.10:
libssl1.0.0 1.0.0e-2ubuntu4.4
Ubuntu 11.04:
libssl0.9.8 0.9.8o-5ubuntu1.4
Ubuntu 10.04 LTS:
libssl0.9.8 0.9.8k-7ubuntu8.10
Ubuntu 8.04 LTS:
libssl0.9.8 0.9.8g-4ubuntu3.17
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1424-1
CVE-2006-7250, CVE-2012-1165, CVE-2012-2110
Package Information:
https://launchpad.net/ubuntu/+source/openssl/1.0.0e-2ubuntu4.4
https://launchpad.net/ubuntu/+source/openssl/0.9.8o-5ubuntu1.4
https://launchpad.net/ubuntu/+source/openssl/0.9.8k-7ubuntu8.10
https://launchpad.net/ubuntu/+source/openssl/0.9.8g-4ubuntu3.17
Posljednje sigurnosne preporuke