|
2 | 2 | OpenSSL CHANGES |
3 | 3 | _______________ |
4 | 4 |
|
| 5 | + Changes between 1.0.1h and 1.0.1i [6 Aug 2014] |
| 6 | + |
| 7 | + *) Fix SRP buffer overrun vulnerability. Invalid parameters passed to the |
| 8 | + SRP code can be overrun an internal buffer. Add sanity check that |
| 9 | + g, A, B < N to SRP code. |
| 10 | + |
| 11 | + Thanks to Sean Devlin and Watson Ladd of Cryptography Services, NCC |
| 12 | + Group for discovering this issue. |
| 13 | + (CVE-2014-3512) |
| 14 | + [Steve Henson] |
| 15 | + |
| 16 | + *) A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate |
| 17 | + TLS 1.0 instead of higher protocol versions when the ClientHello message |
| 18 | + is badly fragmented. This allows a man-in-the-middle attacker to force a |
| 19 | + downgrade to TLS 1.0 even if both the server and the client support a |
| 20 | + higher protocol version, by modifying the client's TLS records. |
| 21 | + |
| 22 | + Thanks to David Benjamin and Adam Langley (Google) for discovering and |
| 23 | + researching this issue. |
| 24 | + (CVE-2014-3511) |
| 25 | + [David Benjamin] |
| 26 | + |
| 27 | + *) OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject |
| 28 | + to a denial of service attack. A malicious server can crash the client |
| 29 | + with a null pointer dereference (read) by specifying an anonymous (EC)DH |
| 30 | + ciphersuite and sending carefully crafted handshake messages. |
| 31 | + |
| 32 | + Thanks to Felix Gr�bert (Google) for discovering and researching this |
| 33 | + issue. |
| 34 | + (CVE-2014-3510) |
| 35 | + [Emilia K�sper] |
| 36 | + |
| 37 | + *) By sending carefully crafted DTLS packets an attacker could cause openssl |
| 38 | + to leak memory. This can be exploited through a Denial of Service attack. |
| 39 | + Thanks to Adam Langley for discovering and researching this issue. |
| 40 | + (CVE-2014-3507) |
| 41 | + [Adam Langley] |
| 42 | + |
| 43 | + *) An attacker can force openssl to consume large amounts of memory whilst |
| 44 | + processing DTLS handshake messages. This can be exploited through a |
| 45 | + Denial of Service attack. |
| 46 | + Thanks to Adam Langley for discovering and researching this issue. |
| 47 | + (CVE-2014-3506) |
| 48 | + [Adam Langley] |
| 49 | + |
| 50 | + *) An attacker can force an error condition which causes openssl to crash |
| 51 | + whilst processing DTLS packets due to memory being freed twice. This |
| 52 | + can be exploited through a Denial of Service attack. |
| 53 | + Thanks to Adam Langley and Wan-Teh Chang for discovering and researching |
| 54 | + this issue. |
| 55 | + (CVE-2014-3505) |
| 56 | + [Adam Langley] |
| 57 | + |
| 58 | + *) If a multithreaded client connects to a malicious server using a resumed |
| 59 | + session and the server sends an ec point format extension it could write |
| 60 | + up to 255 bytes to freed memory. |
| 61 | + |
| 62 | + Thanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this |
| 63 | + issue. |
| 64 | + (CVE-2014-3509) |
| 65 | + [Gabor Tyukasz] |
| 66 | + |
| 67 | + *) A malicious server can crash an OpenSSL client with a null pointer |
| 68 | + dereference (read) by specifying an SRP ciphersuite even though it was not |
| 69 | + properly negotiated with the client. This can be exploited through a |
| 70 | + Denial of Service attack. |
| 71 | + |
| 72 | + Thanks to Joonas Kuorilehto and Riku Hietam�ki (Codenomicon) for |
| 73 | + discovering and researching this issue. |
| 74 | + (CVE-2014-5139) |
| 75 | + [Steve Henson] |
| 76 | + |
| 77 | + *) A flaw in OBJ_obj2txt may cause pretty printing functions such as |
| 78 | + X509_name_oneline, X509_name_print_ex et al. to leak some information |
| 79 | + from the stack. Applications may be affected if they echo pretty printing |
| 80 | + output to the attacker. |
| 81 | + |
| 82 | + Thanks to Ivan Fratric (Google) for discovering this issue. |
| 83 | + (CVE-2014-3508) |
| 84 | + [Emilia K�sper, and Steve Henson] |
| 85 | + |
| 86 | + *) Fix ec_GFp_simple_points_make_affine (thus, EC_POINTs_mul etc.) |
| 87 | + for corner cases. (Certain input points at infinity could lead to |
| 88 | + bogus results, with non-infinity inputs mapped to infinity too.) |
| 89 | + [Bodo Moeller] |
| 90 | + |
5 | 91 | Changes between 1.0.1g and 1.0.1h [5 Jun 2014] |
6 | 92 |
|
7 | 93 | *) Fix for SSL/TLS MITM flaw. An attacker using a carefully crafted |
|
0 commit comments