-----Original Message----- From: nipc-daily-admin@private [mailto:nipc-daily-admin@private] Sent: Thursday, August 01, 2002 2:32 PM To: NIPC-daily@private Subject: [NIPC-daily] NIPC Advisory 02-007 OpenSSL Vulnerability Advisory 02-007 OpenSSL Vulnerability July 31, 2002 The National Infrastructure Protection Center (NIPC) is issuing this advisory to heighten the awareness of multiple buffer overflows in OpenSSL (Open Secure Sockets Layer) version 0.9.6d or earlier and 0.97-beta2 or earlier. OpenSSL is a widely deployed, open source implementation of the SSL and Transport Layer Security (TLS) protocols. The SSL and TLS protocols are used to provide a secure connection between a client and a server for higher level protocols. Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code on a vulnerable server or client system. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following names to the identified vulnerabilities: (CAN-2002-0655) OpenSSL versions 0.9.6d and earlier, and 0.9.7-beta2, experience several buffer overflow vulnerabilities if running on 64-bit platforms. (CAN-2002-0656) The session ID supplied to a client in SSLv3 could result in a buffer overflow. (CAN-2002-0656) A malformed key from an OpenSSL client to an OpenSSL-enabled server, during the handshake, may result in an exploitable buffer overflow. (CAN-2002-0657). Kerberos-enabled OpenSSL 0.9.7-beta2 servers have a buffer overflow on the stack that may allow a remote attacker to execute arbitrary code. Description: OpenSSL is a software package that uses strong cryptography in authentication systems, mail servers, and web servers. Affected versions of OpenSSL include 0.9.6d or earlier and 0.9.7-beta2 or earlier. While there have been no reported victims, the NIPC is issuing this advisory to emphasize the significance of these vulnerabilities. System administrators should be aware that attackers could exploit these vulnerabilities to gain remote access which could provide the attacker with the ability to take any action desired, such as installing malicious code, running programs, reconfiguring, adding, changing, or deleting files. Additional information may be found at the following sites: OpenSSL Security Advisory http://www.openssl.org/news/secadv_20020730.html CERT Advisory CA-2002-23 http://www.cert.org/advisories/CA-2002-23.html Red Hat http://rhn.redhat.com/errata/RHSA-2002-155.html. Recommendation: The NIPC strongly urges the community to take recommended actions to either apply patches from their vendors or consider upgrading to version OpenSSL 0.9.6e, which according to the OpenSSL Project team contains fixes for all the vulnerabilities reported on earlier. The NIPC encourages recipients of this advisory to report computer intrusions to their local FBI office (http://www.fbi.gov/contact/fo/fo.htm) and other appropriate authorities. Recipients may report incidents online to http://www.nipc.gov/incident/cirr.htm. The NIPC Watch and Warning Unit can be reached at (202) 323-3204/3205/3206 or nipc.watch@private ~rm _______________________________________________ NIPC-daily mailing list NIPC-daily@private http://mailman.ops.nipc.gov/mailman/listinfo/nipc-daily
This archive was generated by hypermail 2b30 : Thu Aug 01 2002 - 21:43:40 PDT