Executive Summary

Summary
Title New OpenSSL packages fix decipher vulnerability
Informations
Name DSA-288 First vendor Publication 2003-04-17
Vendor Debian Last vendor Modification 2003-04-17
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Researchers discovered two flaws in OpenSSL, a Secure Socket Layer (SSL) library and related cryptographic tools. Applications that are linked against this library are generally vulnerable to attacks that could leak the server's private key or make the encrypted session decryptable otherwise. The Common Vulnerabilities and Exposures (CVE) project identified the following vulnerabilities:

CAN-2003-0147

OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the server's private key.

CAN-2003-0131

The SSL and allow remote attackers to perform an unauthorized RSA private key operation that cause OpenSSL to leak information regarding the relationship between ciphertext and the associated plaintext.

For the stable distribution (woody) these problems have been fixed in version 0.9.6c-2.woody.3.

For the old stable distribution (potato) these problems have been fixed in version 0.9.6c-0.potato.6.

For the unstable distribution (sid) these problems have been fixed in version 0.9.7b-1 of openssl and version 0.9.6j-1 of openssl096.

We recommend that you upgrade your openssl packages immediately and restart the applications that use OpenSSL.

Unfortunately, RSA blinding is not thread-safe and will cause failures for programs that use threads and OpenSSL such as stunnel. However, since the proposed fix would change the binary interface (ABI), programs that are dynamically linked against OpenSSL won't run anymore. This is a dilemma we can't solve.

You will have to decide whether you want the security update which is not thread-safe and recompile all applications that apparently fail after the upgrade, or fetch the additional source packages at the end of this advisory, recompile it and use a thread-safe OpenSSL library again, but also recompile all applications that make use of it (such as apache-ssl, mod_ssl, ssh etc.).

However, since only very few packages use threads and link against the OpenSSL library most users will be able to use packages from this update without any problems.

Original Source

Url : http://www.debian.org/security/2003/dsa-288

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:461
 
Oval ID: oval:org.mitre.oval:def:461
Title: Klima-Pokorny-Rosa Attack Vulnerability
Description: The SSL and TLS components for OpenSSL 0.9.6i and earlier, 0.9.7, and 0.9.7a allow remote attackers to perform an unauthorized RSA private key operation via a modified Bleichenbacher attack that uses a large number of SSL or TLS connections using PKCS #1 v1.5 padding that cause OpenSSL to leak information regarding the relationship between ciphertext and the associated plaintext, aka the "Klima-Pokorny-Rosa attack."
Family: unix Class: vulnerability
Reference(s): CVE-2003-0131
Version: 2
Platform(s): Red Hat Linux 9
Product(s): OpenSSL
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:466
 
Oval ID: oval:org.mitre.oval:def:466
Title: OpenSSL No RSA Blinding Vulnerability
Description: OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the server's private key by determining factors using timing differences on (1) the number of extra reductions during Montgomery reduction, and (2) the use of different integer multiplication algorithms ("Karatsuba" and normal).
Family: unix Class: vulnerability
Reference(s): CVE-2003-0147
Version: 2
Platform(s): Red Hat Linux 9
Product(s): OpenSSL
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3
Application 11
Application 21

OpenVAS Exploits

Date Description
2009-05-05 Name : HP-UX Update for ApacheStrong HPSBUX00255
File : nvt/gb_hp_ux_HPSBUX00255.nasl
2008-01-17 Name : Debian Security Advisory DSA 288-1 (openssl)
File : nvt/deb_288_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
3948 Multiple SSL/TLS Implementation Non-RSA Blinding Private Key Disclosure

Multiple SSL/TLS implementations contain a flaw that may allow a malicious user to recover the RSA secret. It is possible that the flaw may allow an attacker to guess the private key. resulting in a loss of confidentiality, integrity, and/or availability.
3947 OpenSSL Non-RSA Blinding Private Key Disclosure

OpenSSL contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered because RSA blinding is not enabled by default, which will disclose private key information resulting in a loss of confidentiality.
3946 OpenSSL RSA Klima-Pokorny-Rosa Attack

OpenSSL's implementation of RSA is vulnerable to the Klima-Pokorny-Rosa attack, allowing an attacker to perform one private key operation on chosen ciphertext using the server's private RSA key. A variant of the Bleichenbacher attack, this attack aims to compromise the premaster-secret value from which session keys are derived. This attack targets OpenSSL's implementation of RSA with PKCS #1 v1.5 padding used in SSL 3.0 and TLS 1.0.

Nessus® Vulnerability Scanner

Date Description
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-288.nasl - Type : ACT_GATHER_INFO
2004-07-31 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2003-035.nasl - Type : ACT_GATHER_INFO
2004-07-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2003-102.nasl - Type : ACT_GATHER_INFO
2003-02-20 Name : The remote host has an application that is affected by multiple vulnerabilities.
File : openssl_password_interception.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:32:34
  • Multiple Updates