Executive Summary

Summary
Title OpenSSL vulnerabilities
Informations
Name USN-2079-1 First vendor Publication 2014-01-09
Vendor Ubuntu Last vendor Modification 2014-01-09
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:P)
Cvss Base Score 5.8 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.10 - Ubuntu 13.04 - Ubuntu 12.10 - Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in OpenSSL.

Software Description: - openssl: Secure Socket Layer (SSL) cryptographic library and tools

Details:

Anton Johansson discovered that OpenSSL incorrectly handled certain invalid TLS handshakes. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2013-4353)

Ron Barber discovered that OpenSSL used an incorrect data structure to obtain a version number. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2013-6449)

Dmitry Sobinov discovered that OpenSSL incorrectly handled certain DTLS retransmissions. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2013-6450)

This update also disables the default use of the RdRand feature of certain Intel CPUs as the sole source of entropy.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 13.10:
libssl1.0.0 1.0.1e-3ubuntu1.1

Ubuntu 13.04:
libssl1.0.0 1.0.1c-4ubuntu8.2

Ubuntu 12.10:
libssl1.0.0 1.0.1c-3ubuntu2.6

Ubuntu 12.04 LTS:
libssl1.0.0 1.0.1-4ubuntu5.11

After a standard system update you need to reboot your computer to make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2079-1
CVE-2013-4353, CVE-2013-6449, CVE-2013-6450

Package Information:
https://launchpad.net/ubuntu/+source/openssl/1.0.1e-3ubuntu1.1
https://launchpad.net/ubuntu/+source/openssl/1.0.1c-4ubuntu8.2
https://launchpad.net/ubuntu/+source/openssl/1.0.1c-3ubuntu2.6
https://launchpad.net/ubuntu/+source/openssl/1.0.1-4ubuntu5.11

Original Source

Url : http://www.ubuntu.com/usn/USN-2079-1

CWE : Common Weakness Enumeration

% Id Name
67 % CWE-310 Cryptographic Issues
33 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:21330
 
Oval ID: oval:org.mitre.oval:def:21330
Title: DSA-2833-1 openssl - several
Description: Multiple security issues have been fixed in OpenSSL: The TLS 1.2 support was susceptible to denial of service and retransmission of DTLS messages was fixed. In addition this update disables the insecure Dual_EC_DRBG algorithm (which was unused anyway, see<a href="http://marc.info/?l=openssl-announce&amp;m=138747119822324&amp;w=2">http://marc.info/?l=openssl-announce&amp;m=138747119822324&amp;w=2</a> for further information) and no longer uses the RdRand feature available on some Intel CPUs as a sole source of entropy unless explicitly requested.
Family: unix Class: patch
Reference(s): DSA-2833-1
CVE-2013-6449
CVE-2013-6450
Version: 5
Platform(s): Debian GNU/Linux 7
Debian GNU/kFreeBSD 7
Product(s): openssl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21337
 
Oval ID: oval:org.mitre.oval:def:21337
Title: USN-2079-1 -- openssl vulnerabilities
Description: Several security issues were fixed in OpenSSL.
Family: unix Class: patch
Reference(s): USN-2079-1
CVE-2013-4353
CVE-2013-6449
CVE-2013-6450
Version: 5
Platform(s): Ubuntu 13.10
Ubuntu 13.04
Ubuntu 12.10
Ubuntu 12.04
Product(s): openssl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21357
 
Oval ID: oval:org.mitre.oval:def:21357
Title: DSA-2837-1 openssl - programming error
Description: Anton Johansson discovered that an invalid TLS handshake package could crash OpenSSL with a NULL pointer dereference.
Family: unix Class: patch
Reference(s): DSA-2837-1
CVE-2013-4353
Version: 5
Platform(s): Debian GNU/Linux 7
Debian GNU/kFreeBSD 7
Product(s): openssl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22018
 
Oval ID: oval:org.mitre.oval:def:22018
Title: RHSA-2014:0015: openssl security update (Important)
Description: The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
Family: unix Class: patch
Reference(s): RHSA-2014:0015-00
CESA-2014:0015
CVE-2013-4353
CVE-2013-6449
CVE-2013-6450
Version: 44
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): openssl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22174
 
Oval ID: oval:org.mitre.oval:def:22174
Title: AIX OpenSSH Vulnerability
Description: The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
Family: unix Class: vulnerability
Reference(s): CVE-2013-6449
Version: 4
Platform(s): IBM AIX 5.3
IBM AIX 6.1
IBM AIX 7.1
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22420
 
Oval ID: oval:org.mitre.oval:def:22420
Title: The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake
Description: The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
Family: unix Class: vulnerability
Reference(s): CVE-2013-4353
Version: 3
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): OpenSSL
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22428
 
Oval ID: oval:org.mitre.oval:def:22428
Title: AIX OpenSSH Vulnerability
Description: The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
Family: unix Class: vulnerability
Reference(s): CVE-2013-4353
Version: 4
Platform(s): IBM AIX 5.3
IBM AIX 6.1
IBM AIX 7.1
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22518
 
Oval ID: oval:org.mitre.oval:def:22518
Title: AIX OpenSSH Vulnerability
Description: The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
Family: unix Class: vulnerability
Reference(s): CVE-2013-6450
Version: 4
Platform(s): IBM AIX 5.3
IBM AIX 6.1
IBM AIX 7.1
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24168
 
Oval ID: oval:org.mitre.oval:def:24168
Title: Vulnerability in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f, might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash)
Description: The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
Family: windows Class: vulnerability
Reference(s): CVE-2013-6450
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): OpenSSL
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24182
 
Oval ID: oval:org.mitre.oval:def:24182
Title: ELSA-2014:0015: openssl security update (Important)
Description: The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
Family: unix Class: patch
Reference(s): ELSA-2014:0015-00
CVE-2013-4353
CVE-2013-6449
CVE-2013-6450
Version: 17
Platform(s): Oracle Linux 6
Product(s): openssl
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25001
 
Oval ID: oval:org.mitre.oval:def:25001
Title: Vulnerability in OpenSSL before 1.0.2, obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash)
Description: The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
Family: windows Class: vulnerability
Reference(s): CVE-2013-6449
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): OpenSSL
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25032
 
Oval ID: oval:org.mitre.oval:def:25032
Title: Vulnerability in OpenSSL 1.0.1 before 1.0.1f, allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash)
Description: The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
Family: windows Class: vulnerability
Reference(s): CVE-2013-4353
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): OpenSSL
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27273
 
Oval ID: oval:org.mitre.oval:def:27273
Title: DEPRECATED: ELSA-2014-0015 -- openssl security update (important)
Description: [1.0.1e-16.4] - fix CVE-2013-4353 - Invalid TLS handshake crash [1.0.1e-16.3] - fix CVE-2013-6450 - possible MiTM attack on DTLS1 [1.0.1e-16.2] - fix CVE-2013-6449 - crash when version in SSL structure is incorrect
Family: unix Class: patch
Reference(s): ELSA-2014-0015
CVE-2013-4353
CVE-2013-6449
CVE-2013-6450
Version: 4
Platform(s): Oracle Linux 6
Product(s): openssl
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 325

Information Assurance Vulnerability Management (IAVM)

Date Description
2014-05-01 IAVM : 2014-A-0062 - Multiple Vulnerabilities In McAfee Email Gateway
Severity : Category I - VMSKEY : V0050005
2014-04-24 IAVM : 2014-B-0046 - Multiple Vulnerabilities in HP System Management Homepage (SMH)
Severity : Category I - VMSKEY : V0049737
2014-04-17 IAVM : 2014-B-0041 - Multiple Vulnerabilities in Splunk
Severity : Category I - VMSKEY : V0049577

Snort® IPS/IDS

Date Description
2019-10-01 OpenSSL TLS record tampering denial of service attempt
RuleID : 51334 - Revision : 1 - Type : SERVER-OTHER
2019-10-01 OpenSSL TLS record tampering denial of service attempt
RuleID : 51333 - Revision : 1 - Type : SERVER-OTHER
2016-05-19 OpenSSL TLS change cipher spec protocol denial of service attempt
RuleID : 38575 - Revision : 4 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

Date Description
2015-01-19 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_openssl_20140731.nasl - Type : ACT_GATHER_INFO
2015-01-19 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_openssl_20140623.nasl - Type : ACT_GATHER_INFO
2014-12-26 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201412-39.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2014-0032.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-0416.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2014-0041.nasl - Type : ACT_GATHER_INFO
2014-10-10 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL15158.nasl - Type : ACT_GATHER_INFO
2014-10-10 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL15147.nasl - Type : ACT_GATHER_INFO
2014-08-10 Name : The remote Fedora host is missing a security update.
File : fedora_2014-9308.nasl - Type : ACT_GATHER_INFO
2014-08-10 Name : The remote Fedora host is missing a security update.
File : fedora_2014-9301.nasl - Type : ACT_GATHER_INFO
2014-07-15 Name : The remote host contains an application that is affected by an information di...
File : macosx_libreoffice_423.nasl - Type : ACT_GATHER_INFO
2014-07-15 Name : The remote host contains an application that is affected by an information di...
File : libreoffice_423.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-63.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-62.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-60.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-4.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-27.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-11.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-10.nasl - Type : ACT_GATHER_INFO
2014-04-18 Name : The remote web server is affected by multiple vulnerabilities.
File : hpsmh_7_3_2.nasl - Type : ACT_GATHER_INFO
2014-04-16 Name : The remote web server contains an application that is affected by multiple Op...
File : splunk_603.nasl - Type : ACT_GATHER_INFO
2014-04-16 Name : The remote AIX host is running a vulnerable version of OpenSSL.
File : aix_openssl_advisory6.nasl - Type : ACT_GATHER_INFO
2014-03-21 Name : A web application on the remote host is affected by a denial of service vulne...
File : puppet_enterprise_312.nasl - Type : ACT_GATHER_INFO
2014-02-23 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201402-25.nasl - Type : ACT_GATHER_INFO
2014-02-05 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-273.nasl - Type : ACT_GATHER_INFO
2014-02-04 Name : The remote Fedora host is missing a security update.
File : fedora_2014-1560.nasl - Type : ACT_GATHER_INFO
2014-01-28 Name : The remote Fedora host is missing a security update.
File : fedora_2014-1567.nasl - Type : ACT_GATHER_INFO
2014-01-20 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-007.nasl - Type : ACT_GATHER_INFO
2014-01-14 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2014-013-02.nasl - Type : ACT_GATHER_INFO
2014-01-13 Name : The remote Fedora host is missing a security update.
File : fedora_2014-0474.nasl - Type : ACT_GATHER_INFO
2014-01-12 Name : The remote Fedora host is missing a security update.
File : fedora_2014-0476.nasl - Type : ACT_GATHER_INFO
2014-01-12 Name : The remote Fedora host is missing a security update.
File : fedora_2014-0456.nasl - Type : ACT_GATHER_INFO
2014-01-10 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2079-1.nasl - Type : ACT_GATHER_INFO
2014-01-10 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20140108_openssl_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2014-01-09 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-0015.nasl - Type : ACT_GATHER_INFO
2014-01-09 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-0015.nasl - Type : ACT_GATHER_INFO
2014-01-09 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-0015.nasl - Type : ACT_GATHER_INFO
2014-01-08 Name : The remote host may be affected by a security bypass vulnerability.
File : openssl_1_0_0l.nasl - Type : ACT_GATHER_INFO
2014-01-08 Name : The remote service may be affected by multiple vulnerabilities.
File : openssl_1_0_1f.nasl - Type : ACT_GATHER_INFO
2014-01-08 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2837.nasl - Type : ACT_GATHER_INFO
2014-01-07 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_5aaa257e772d11e3a65a3c970e169bc2.nasl - Type : ACT_GATHER_INFO
2014-01-02 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2833.nasl - Type : ACT_GATHER_INFO
2013-12-23 Name : The remote Fedora host is missing a security update.
File : fedora_2013-23794.nasl - Type : ACT_GATHER_INFO
2013-12-23 Name : The remote Fedora host is missing a security update.
File : fedora_2013-23788.nasl - Type : ACT_GATHER_INFO
2013-12-23 Name : The remote Fedora host is missing a security update.
File : fedora_2013-23768.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 12:02:58
  • Multiple Updates
2014-01-10 00:19:01
  • First insertion