Amazon Linux AMI update for openssl



Risk Medium
Patch available YES
Number of vulnerabilities 6
CVE-ID CVE-2017-3738
CVE-2017-3736
CVE-2017-3737
CVE-2016-0701
CVE-2017-3732
CVE-2015-3193
CWE-ID CWE-120
CWE-310
CWE-20
CWE-200
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Amazon Linux AMI
Operating systems & Components / Operating system

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 6 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU9595

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3738

CWE-ID: CWE-120 - Buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to buffer overflow in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. A remote attacker can cause the server to share the DH1024 private key among multiple clients and perform attack on TLS.

Mitigation

Update the affected packages.

i686:
    openssl-devel-1.0.2k-12.109.amzn1.i686
    openssl-1.0.2k-12.109.amzn1.i686
    openssl-debuginfo-1.0.2k-12.109.amzn1.i686
    openssl-static-1.0.2k-12.109.amzn1.i686
    openssl-perl-1.0.2k-12.109.amzn1.i686

src:
    openssl-1.0.2k-12.109.amzn1.src

x86_64:
    openssl-static-1.0.2k-12.109.amzn1.x86_64
    openssl-devel-1.0.2k-12.109.amzn1.x86_64
    openssl-1.0.2k-12.109.amzn1.x86_64
    openssl-debuginfo-1.0.2k-12.109.amzn1.x86_64
    openssl-perl-1.0.2k-12.109.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2018-1016.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Carry propagation issue

EUVDB-ID: #VU9109

Risk: Low

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3736

CWE-ID: CWE-310 - Cryptographic Issues

Exploit availability: No

Description

The vulnerability allows a remote attacker to decrypt data.

The vulnerability exists due to carry propagating bug in the x86_64 Montgomery squaring procedure (bn_sqrx8x_internal). A remote attacker can decrypt encrypted data. The vulnerability affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.

Mitigation

Update the affected packages.

i686:
    openssl-devel-1.0.2k-12.109.amzn1.i686
    openssl-1.0.2k-12.109.amzn1.i686
    openssl-debuginfo-1.0.2k-12.109.amzn1.i686
    openssl-static-1.0.2k-12.109.amzn1.i686
    openssl-perl-1.0.2k-12.109.amzn1.i686

src:
    openssl-1.0.2k-12.109.amzn1.src

x86_64:
    openssl-static-1.0.2k-12.109.amzn1.x86_64
    openssl-devel-1.0.2k-12.109.amzn1.x86_64
    openssl-1.0.2k-12.109.amzn1.x86_64
    openssl-debuginfo-1.0.2k-12.109.amzn1.x86_64
    openssl-perl-1.0.2k-12.109.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2018-1016.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper input validation

EUVDB-ID: #VU9594

Risk: Medium

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3737

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information on the target system.

The weakness exists due to an "error state mechanism" when SSL_read() or SSL_write() is called directly after SSL object. A remote attacker can a specially crafted input, trigger a fatal error during a handshake and return it in the initial function call to access or modify sensitive information.

Mitigation

Update the affected packages.

i686:
    openssl-devel-1.0.2k-12.109.amzn1.i686
    openssl-1.0.2k-12.109.amzn1.i686
    openssl-debuginfo-1.0.2k-12.109.amzn1.i686
    openssl-static-1.0.2k-12.109.amzn1.i686
    openssl-perl-1.0.2k-12.109.amzn1.i686

src:
    openssl-1.0.2k-12.109.amzn1.src

x86_64:
    openssl-static-1.0.2k-12.109.amzn1.x86_64
    openssl-devel-1.0.2k-12.109.amzn1.x86_64
    openssl-1.0.2k-12.109.amzn1.x86_64
    openssl-debuginfo-1.0.2k-12.109.amzn1.x86_64
    openssl-perl-1.0.2k-12.109.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2018-1016.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Information disclosure

EUVDB-ID: #VU2972

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-0701

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to DH_check_pub_key() function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.

Mitigation

Update the affected packages.

i686:
    openssl-devel-1.0.2k-12.109.amzn1.i686
    openssl-1.0.2k-12.109.amzn1.i686
    openssl-debuginfo-1.0.2k-12.109.amzn1.i686
    openssl-static-1.0.2k-12.109.amzn1.i686
    openssl-perl-1.0.2k-12.109.amzn1.i686

src:
    openssl-1.0.2k-12.109.amzn1.src

x86_64:
    openssl-static-1.0.2k-12.109.amzn1.x86_64
    openssl-devel-1.0.2k-12.109.amzn1.x86_64
    openssl-1.0.2k-12.109.amzn1.x86_64
    openssl-debuginfo-1.0.2k-12.109.amzn1.x86_64
    openssl-perl-1.0.2k-12.109.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2018-1016.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Information disclosure

EUVDB-ID: #VU5442

Risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3732

CWE-ID: CWE-310 - Cryptographic Issues

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to propagating error in the x86_64 Montgomery squaring procedure. A remote attacker with access to unpatched vulnerable system that uses a shared private key with Diffie-Hellman (DH) parameters set can gain unauthorized access to sensitive private key information.

According to vendor’s advisory, this vulnerability is unlikely to be exploited in real-world attacks, as it requires significant resources and online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients.

Vulnerability exploitation against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely.

Mitigation

Update the affected packages.

i686:
    openssl-devel-1.0.2k-12.109.amzn1.i686
    openssl-1.0.2k-12.109.amzn1.i686
    openssl-debuginfo-1.0.2k-12.109.amzn1.i686
    openssl-static-1.0.2k-12.109.amzn1.i686
    openssl-perl-1.0.2k-12.109.amzn1.i686

src:
    openssl-1.0.2k-12.109.amzn1.src

x86_64:
    openssl-static-1.0.2k-12.109.amzn1.x86_64
    openssl-devel-1.0.2k-12.109.amzn1.x86_64
    openssl-1.0.2k-12.109.amzn1.x86_64
    openssl-debuginfo-1.0.2k-12.109.amzn1.x86_64
    openssl-perl-1.0.2k-12.109.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2018-1016.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Information disclosure

EUVDB-ID: #VU2765

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-3193

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists in the Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl on the x86_64 platform, as used by the BN_mod_exp function, due to mishandling of carry propagation and producing incorrect output. A remote attacker can gain potentially sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.

Mitigation

Update the affected packages.

i686:
    openssl-devel-1.0.2k-12.109.amzn1.i686
    openssl-1.0.2k-12.109.amzn1.i686
    openssl-debuginfo-1.0.2k-12.109.amzn1.i686
    openssl-static-1.0.2k-12.109.amzn1.i686
    openssl-perl-1.0.2k-12.109.amzn1.i686

src:
    openssl-1.0.2k-12.109.amzn1.src

x86_64:
    openssl-static-1.0.2k-12.109.amzn1.x86_64
    openssl-devel-1.0.2k-12.109.amzn1.x86_64
    openssl-1.0.2k-12.109.amzn1.x86_64
    openssl-debuginfo-1.0.2k-12.109.amzn1.x86_64
    openssl-perl-1.0.2k-12.109.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2018-1016.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###