how does that affect OpenVPN? суббота, 18 октября 2014 г. пользователь Lisa Minogue написал:
> OpenSSL Security Advisory [15 Oct 2014] > ======================================= > > SRTP Memory Leak (CVE-2014-3513) > ================================ > > Severity: High > > A flaw in the DTLS SRTP extension parsing code allows an attacker, who > sends a carefully crafted handshake message, to cause OpenSSL to fail > to free up to 64k of memory causing a memory leak. This could be > exploited in a Denial Of Service attack. This issue affects OpenSSL > 1.0.1 server implementations for both SSL/TLS and DTLS regardless of > whether SRTP is used or configured. Implementations of OpenSSL that > have been compiled with OPENSSL_NO_SRTP defined are not affected. > > OpenSSL 1.0.1 users should upgrade to 1.0.1j. > > This issue was reported to OpenSSL on 26th September 2014, based on an > original > issue and patch developed by the LibreSSL project. Further analysis of the > issue > was performed by the OpenSSL team. > > The fix was developed by the OpenSSL team. > > > Session Ticket Memory Leak (CVE-2014-3567) > ========================================== > > Severity: Medium > > When an OpenSSL SSL/TLS/DTLS server receives a session ticket the > integrity of that ticket is first verified. In the event of a session > ticket integrity check failing, OpenSSL will fail to free memory > causing a memory leak. By sending a large number of invalid session > tickets an attacker could exploit this issue in a Denial Of Service > attack. > > OpenSSL 1.0.1 users should upgrade to 1.0.1j. > OpenSSL 1.0.0 users should upgrade to 1.0.0o. > OpenSSL 0.9.8 users should upgrade to 0.9.8zc. > > This issue was reported to OpenSSL on 8th October 2014. > > The fix was developed by Stephen Henson of the OpenSSL core team. > > > SSL 3.0 Fallback protection > =========================== > > Severity: Medium > > OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications > to block the ability for a MITM attacker to force a protocol > downgrade. > > Some client applications (such as browsers) will reconnect using a > downgraded protocol to work around interoperability bugs in older > servers. This could be exploited by an active man-in-the-middle to > downgrade connections to SSL 3.0 even if both sides of the connection > support higher protocols. SSL 3.0 contains a number of weaknesses > including POODLE (CVE-2014-3566). > > OpenSSL 1.0.1 users should upgrade to 1.0.1j. > OpenSSL 1.0.0 users should upgrade to 1.0.0o. > OpenSSL 0.9.8 users should upgrade to 0.9.8zc. > > https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 > https://www.openssl.org/~bodo/ssl-poodle.pdf > > Support for TLS_FALLBACK_SCSV was developed by Adam Langley and Bodo > Moeller. > > > Build option no-ssl3 is incomplete (CVE-2014-3568) > ================================================== > > Severity: Low > > When OpenSSL is configured with "no-ssl3" as a build option, servers > could accept and complete a SSL 3.0 handshake, and clients could be > configured to send them. > > OpenSSL 1.0.1 users should upgrade to 1.0.1j. > OpenSSL 1.0.0 users should upgrade to 1.0.0o. > OpenSSL 0.9.8 users should upgrade to 0.9.8zc. > > This issue was reported to OpenSSL by Akamai Technologies on 14th October > 2014. > > The fix was developed by Akamai and the OpenSSL team. > > > > ---------------------------------------- > > From: Илья Шипицин <chipits...@gmail.com <javascript:;>> > > Sent: Fri Oct 17 21:59:04 CEST 2014 > > To: Lisa Minogue <lmino...@mail.be <javascript:;>> > > Subject: Re: [Openvpn-devel] New OpenVPN bundles for Windows platform > that incorporate OpenSSL 1.0.1j > > > > > > can you please describe carefully, how those vulnerabilities do affect > OpenVPN ? > ----------------------------------------------------- > Mail.be, WebMail and Virtual Office > http://www.mail.be >