openSUSE update for openssl



| Updated: 2019-04-17
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2014-0195
CVE-2014-0221
CVE-2014-0224
CVE-2014-3470
CWE-ID CWE-119
CWE-399
CWE-310
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #3 is available.
Vulnerable software
SUSE Linux
Operating systems & Components / Operating system

Vendor SUSE

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU11533

Risk: High

CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2014-0195

CWE-ID: CWE-119 - Memory corruption

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in OpenSSL when processing DTLS fragments to an OpenSSL DTLS client or server. A remote attacker can send a specially crafted request to vulnerable application and cause the server to crash or execute arbitrary code on the target system.

Successful exploitation of the vulnerability requires that server support DTLS.

Mitigation

Update the affected packages.

Vulnerable software versions

SUSE Linux: 11.4

CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.

2) Resource management error

EUVDB-ID: #VU11532

Risk: Medium

CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2014-0221

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to an error when processing invalid DTLS handshake. A remote attacker can initiate SSL/TLS connection to the affected application and trigger denial of service conditions.

Mitigation

Update the affected packages.

Vulnerable software versions

SUSE Linux: 11.4

CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Man-in-the-Middle attack

EUVDB-ID: #VU2950

Risk: Medium

CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:A/U:Green]

CVE-ID: CVE-2014-0224

CWE-ID: CWE-310 - Cryptographic Issues

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to decrypt encrypted connections.

The vulnerability exists due to an error in OpenSSL. A remote attacker with ability to intercept network traffic can decrypt SSL connection and gain access to sensitive data.

Mitigation

Update the affected packages.

Vulnerable software versions

SUSE Linux: 11.4

CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.

4) Resource management error

EUVDB-ID: #VU11536

Risk: Low

CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2014-3470

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error when processing ECDH ciphersuites in TLS clients. A remote attacker can send a specially crafted response to vulnerable OpenSSL client and cause the application to crash.


Mitigation

Update the affected packages.

Vulnerable software versions

SUSE Linux: 11.4

CPE2.3 External links

http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###