OpenSSL TLS handshake Denial of Service

2008-05-30T00:00:00
ID VU:520586
Type cert
Reporter CERT
Modified 2008-05-30T00:00:00

Description

Overview

A vulnerability exists in OpenSSL that may allow a remote attacker to cause a denial of service.

Description

OpenSSL contains a vulnerability in the way specially crafted TLS handshake packets are handled that may result in a denial of service. According to OpenSSL Security Advisory [28-Mar-2008]:

... if the 'Server Key exchange message' is omitted from a TLS handshake in OpenSSL 0.9.8f and OpenSSL 0.9.8g. If a client connects to a malicious server with particular cipher suites, the server could cause the client to crash.

Note that this issue may affect OpenSSL versions prior to 0.9.8h.


Impact

A remote, unauthorized attacker may be able to cause a denial of service.


Solution

Upgrade or Apply Patch
OpenSSL has issued an upgrade and a patch to address this issue. See OpenSSL Security Advisory [28-Mar-2008] for more information. OpenSSL is included in various Linux and UNIX distributions. Please consult the relevant documentation of your distribution to obtain the appropriate updates.


Systems Affected

Vendor| Status| Date Notified| Date Updated
---|---|---|---
OpenSSL| | -| 30 May 2008
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A

References

  • <http://www.securityfocus.com/bid/29405>
  • <http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html>
  • <http://secunia.com/advisories/30405/>
  • <http://www.openssl.org/news/secadv_20080528.txt>

Credit

This issue was reported in OpenSSL Security Advisory [28-Mar-2008] . OpenSSL credits Codenomicon for reporting these issues.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: CVE-2008-1672
  • Date Public: 28 May 2008
  • Date First Published: 30 May 2008
  • Date Last Updated: 30 May 2008
  • Severity Metric: 14.70
  • Document Revision: 8