Executive Summary
Summary | |
---|---|
Title | New OpenSSL packages fix decipher vulnerability |
Informations | |||
---|---|---|---|
Name | DSA-288 | First vendor Publication | 2003-04-17 |
Vendor | Debian | Last vendor Modification | 2003-04-17 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Researchers discovered two flaws in OpenSSL, a Secure Socket Layer (SSL) library and related cryptographic tools. Applications that are linked against this library are generally vulnerable to attacks that could leak the server's private key or make the encrypted session decryptable otherwise. The Common Vulnerabilities and Exposures (CVE) project identified the following vulnerabilities: CAN-2003-0147 OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the server's private key. CAN-2003-0131 The SSL and allow remote attackers to perform an unauthorized RSA private key operation that cause OpenSSL to leak information regarding the relationship between ciphertext and the associated plaintext. For the stable distribution (woody) these problems have been fixed in version 0.9.6c-2.woody.3. For the old stable distribution (potato) these problems have been fixed in version 0.9.6c-0.potato.6. For the unstable distribution (sid) these problems have been fixed in version 0.9.7b-1 of openssl and version 0.9.6j-1 of openssl096. We recommend that you upgrade your openssl packages immediately and restart the applications that use OpenSSL. Unfortunately, RSA blinding is not thread-safe and will cause failures for programs that use threads and OpenSSL such as stunnel. However, since the proposed fix would change the binary interface (ABI), programs that are dynamically linked against OpenSSL won't run anymore. This is a dilemma we can't solve. You will have to decide whether you want the security update which is not thread-safe and recompile all applications that apparently fail after the upgrade, or fetch the additional source packages at the end of this advisory, recompile it and use a thread-safe OpenSSL library again, but also recompile all applications that make use of it (such as apache-ssl, mod_ssl, ssh etc.). However, since only very few packages use threads and link against the OpenSSL library most users will be able to use packages from this update without any problems. |
Original Source
Url : http://www.debian.org/security/2003/dsa-288 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:461 | |||
Oval ID: | oval:org.mitre.oval:def:461 | ||
Title: | Klima-Pokorny-Rosa Attack Vulnerability | ||
Description: | The SSL and TLS components for OpenSSL 0.9.6i and earlier, 0.9.7, and 0.9.7a allow remote attackers to perform an unauthorized RSA private key operation via a modified Bleichenbacher attack that uses a large number of SSL or TLS connections using PKCS #1 v1.5 padding that cause OpenSSL to leak information regarding the relationship between ciphertext and the associated plaintext, aka the "Klima-Pokorny-Rosa attack." | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0131 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:466 | |||
Oval ID: | oval:org.mitre.oval:def:466 | ||
Title: | OpenSSL No RSA Blinding Vulnerability | ||
Description: | OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the server's private key by determining factors using timing differences on (1) the number of extra reductions during Montgomery reduction, and (2) the use of different integer multiplication algorithms ("Karatsuba" and normal). | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0147 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | OpenSSL |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-05-05 | Name : HP-UX Update for ApacheStrong HPSBUX00255 File : nvt/gb_hp_ux_HPSBUX00255.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 288-1 (openssl) File : nvt/deb_288_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
3948 | Multiple SSL/TLS Implementation Non-RSA Blinding Private Key Disclosure Multiple SSL/TLS implementations contain a flaw that may allow a malicious user to recover the RSA secret. It is possible that the flaw may allow an attacker to guess the private key. resulting in a loss of confidentiality, integrity, and/or availability. |
3947 | OpenSSL Non-RSA Blinding Private Key Disclosure OpenSSL contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered because RSA blinding is not enabled by default, which will disclose private key information resulting in a loss of confidentiality. |
3946 | OpenSSL RSA Klima-Pokorny-Rosa Attack OpenSSL's implementation of RSA is vulnerable to the Klima-Pokorny-Rosa attack, allowing an attacker to perform one private key operation on chosen ciphertext using the server's private RSA key. A variant of the Bleichenbacher attack, this attack aims to compromise the premaster-secret value from which session keys are derived. This attack targets OpenSSL's implementation of RSA with PKCS #1 v1.5 padding used in SSL 3.0 and TLS 1.0. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-288.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-035.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-102.nasl - Type : ACT_GATHER_INFO |
2003-02-20 | Name : The remote host has an application that is affected by multiple vulnerabilities. File : openssl_password_interception.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:32:34 |
|