PR#3400 and CVE-2014-0224

2014-08-11 Thread Aditya Kumar
Hi All, We are using OpenSSL version 0.9.8h. We take the security vulnerability fixes from latest release of OpenSSL 0.9.8 series and patch our internally used 0.9.8h. From the OpenSSL release 0.9.8za, we took CVE-2014-0224 and merged it our OpenSSL code. But in latest release 0.9.8za, I see

Is OpenSSl fips 2.0.5 also affected by CVE-2014-0224

2014-06-12 Thread Karthik R
Does the recent vulnerability exposed in openSSL - CVE-2014-0224 and CVE-2014-0221 affect openssl-fips-2.0.5 ? If Yes, How do I get fips compliant openSSL? -Karthik R

Re: Is OpenSSl fips 2.0.5 also affected by CVE-2014-0224

2014-06-12 Thread Dr. Stephen Henson
On Thu, Jun 12, 2014, Karthik R wrote: Does the recent vulnerability exposed in openSSL - CVE-2014-0224 and CVE-2014-0221 affect openssl-fips-2.0.5 ? If Yes, How do I get fips compliant openSSL? If you mean the FIPS module then no. The FIPS module does not contain any TLS or DTLS code

CVE-2014-0224

2014-06-11 Thread Scott Neugroschl
Hi guys, I know 0.9.7 is no longer under development, but for various reasons, I have an app that is still using 0.9.7g. Is 0.9.7g subject to the vulnerability from CVD-0214-0224? Thanks, ScottN __ OpenSSL Project

Re: CVE-2014-0224

2014-06-11 Thread Dr. Stephen Henson
On Wed, Jun 11, 2014, Scott Neugroschl wrote: Hi guys, I know 0.9.7 is no longer under development, but for various reasons, I have an app that is still using 0.9.7g. Is 0.9.7g subject to the vulnerability from CVD-0214-0224? I think you mean CVE-2014-0224. Yes it is vulnerable

Re: CVE-2014-0224

2014-06-11 Thread Viktor Dukhovni
On Wed, Jun 11, 2014 at 04:09:47PM +, Scott Neugroschl wrote: I know 0.9.7 is no longer under development, but for various reasons, I have an app that is still using 0.9.7g. Is 0.9.7g subject to the vulnerability from CVD-0214-0224? There are I expect many unresolved issues (even if not

RE: CVE-2014-0224

2014-06-11 Thread Scott Neugroschl
From Victor: On Wed, Jun 11, 2014 at 04:09:47PM +, Scott Neugroschl wrote: I know 0.9.7 is no longer under development, but for various reasons, I have an app that is still using 0.9.7g. Is 0.9.7g subject to the vulnerability from CVD-0214-0224? There are I expect many unresolved issues

Re: CVE-2014-0224

2014-06-11 Thread Viktor Dukhovni
On Wed, Jun 11, 2014 at 07:07:09PM +, Scott Neugroschl wrote: We are aware of this, and are looking to upgrade. Does anyone have a recommendation as to 0.9.8 vs 1.0.0 (1.0.1 is too bleeding edge)? If you have a recommendation, may I ask what led you to choose that path? I would

CVE-2014-0224

2014-06-05 Thread Jeffrey Walton
CVE-2014-0224 looks like an interesting issue (https://www.openssl.org/news/secadv_20140605.txt): An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM

RE: CVE-2014-0224

2014-06-05 Thread Salz, Rich
Can anyone explain the vulnerability? A handful of links Here's the timeline, a public document: https://plus.google.com/u/0/+MarkJCox/posts/L8i6PSsKJKs And this blog entry from the guy who found the bug. BTW, it's 16 years old.

Re: CVE-2014-0224

2014-06-05 Thread Jeroen de Neef
I am also quite curious. Also, how long has this exploit been around, and could hackers have exploited this already? 2014-06-05 22:46 GMT+02:00 Jeffrey Walton noloa...@gmail.com: CVE-2014-0224 looks like an interesting issue (https://www.openssl.org/news/secadv_20140605.txt

Re: CVE-2014-0224

2014-06-05 Thread Jeffrey Walton
On Thu, Jun 5, 2014 at 4:49 PM, Salz, Rich rs...@akamai.com wrote: Can anyone explain the vulnerability? A handful of links Here's the timeline, a public document: https://plus.google.com/u/0/+MarkJCox/posts/L8i6PSsKJKs And this blog entry from the guy who found the bug. BTW, it's

Re: CVE-2014-0224

2014-06-05 Thread Tim Hudson
I've also added these into the wiki at http://wiki.openssl.org/index.php/SECADV_20140605 - so that others looking back through the issues can find a handy reference to the additional information from various locations - the link at http://wiki.openssl.org/index.php/Security_Advisories basically