Vulnerabilities > CVE-2008-1672 - NULL Pointer Dereference vulnerability in multiple products

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL

Summary

OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference.

Vulnerable Configurations

Part Description Count
Application
Openssl
2
OS
Canonical
1

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyWeb Servers
    NASL idOPENSSL_0_9_8H.NASL
    descriptionAccording to its banner, the remote web server uses a version of OpenSSL older than 0.9.8h. As such, it may be affected by the following vulnerabilities : - A double-free error exists related to the handling of server name extension data and specially crafted TLS 1.0
    last seen2020-06-01
    modified2020-06-02
    plugin id56996
    published2011-12-02
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56996
    titleOpenSSL < 0.9.8h Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    
    if (description)
    {
      script_id(56996);
      script_version("1.12");
      script_cvs_date("Date: 2018/11/15 20:50:25");
    
      script_cve_id("CVE-2008-0891", "CVE-2008-1672", "CVE-2011-4354");
      script_bugtraq_id(29405, 50882);
      script_xref(name:"CERT", value:"520586");
      script_xref(name:"CERT", value:"661475");
    
      script_name(english:"OpenSSL < 0.9.8h Multiple Vulnerabilities");
      script_summary(english:"Does a banner check");
    
      script_set_attribute(
        attribute:"synopsis",
        value:"The remote web server has multiple SSL-related vulnerabilities."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "According to its banner, the remote web server uses a version of
    OpenSSL older than 0.9.8h.  As such, it may be affected by the
    following vulnerabilities :
    
      - A double-free error exists related to the handling of
        server name extension data and specially crafted TLS
        1.0 'Client Hello' packets. This can cause application
        crashes. Note that successful exploitation requires that
        OpenSSL is compiled with the TLS server name extensions.
        (CVE-2008-0891)
    
      - A NULL pointer dereference error exists related to 
        anonymous Diffie-Hellman key exchange and TLS
        handshakes. This can be exploited by omitting the 
        'Server Key exchange message' from the handshake and
        can cause application crashes. (CVE-2008-1672)
    
      - On 32-bit builds, an information disclosure
        vulnerability exists during certain calculations for 
        NIST elliptic curves P-256 or P-384. This error can
        allow an attacker to recover the private key of the TLS
        server. 
    
        The following are required for exploitation :
    
          - 32-bit build
          - Use of elliptic curves P-256 and/or P-384
          - Either the use of ECDH family ciphers and/or the 
            use of ECDHE family ciphers without the
            SSL_OP_SINGLE_ECDH_USE context option 
    
        (CVE-2011-4354)
    
    Note that Nessus has not attempted to verify that these issues are
    actually exploitable or have been patched but instead has relied on
    the version number found in the Server response header."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.openwall.com/lists/oss-security/2011/12/01/6"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.openssl.org/news/secadv/20080528.txt"
      );
      script_set_attribute(attribute:"solution", value:
    "Upgrade to OpenSSL 0.9.8h or later or apply the vendor-supplied
    patches.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(189, 287);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2008/05/28");
      script_set_attribute(attribute:"patch_publication_date", value:"2008/05/28");
      script_set_attribute(attribute:"plugin_publication_date", value:"2011/12/02");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:openssl:openssl");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Web Servers");
    
      script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.");
    
      script_dependencies("openssl_version.nasl");
      script_require_keys("openssl/port");
    
      exit(0);
    }
    
    
    include("openssl_version.inc");
    
    openssl_check_version(fixed:'0.9.8h', severity:SECURITY_WARNING);
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200806-08.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200806-08 (OpenSSL: Denial of Service) Ossi Herrala and Jukka Taimisto of Codenomicon discovered two vulnerabilities: A double free() call in the TLS server name extension (CVE-2008-0891). The OpenSSL client code does not properly handle servers that omit the Server Key Exchange message in the TLS handshake (CVE-2008-1672). Impact : A remote attacker could connect to a vulnerable server, or entice a daemon to connect to a malicious server, causing a Denial of Service of the daemon in both cases. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id33244
    published2008-06-24
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/33244
    titleGLSA-200806-08 : OpenSSL: Denial of Service
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 200806-08.
    #
    # The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(33244);
      script_version("1.17");
      script_cvs_date("Date: 2019/08/02 13:32:45");
    
      script_cve_id("CVE-2008-0891", "CVE-2008-1672");
      script_xref(name:"GLSA", value:"200806-08");
    
      script_name(english:"GLSA-200806-08 : OpenSSL: Denial of Service");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-200806-08
    (OpenSSL: Denial of Service)
    
        Ossi Herrala and Jukka Taimisto of Codenomicon discovered two
        vulnerabilities:
        A double free() call in the TLS server name extension (CVE-2008-0891).
        The OpenSSL client code does not properly handle servers that omit the
        Server Key Exchange message in the TLS handshake (CVE-2008-1672).
      
    Impact :
    
        A remote attacker could connect to a vulnerable server, or entice a
        daemon to connect to a malicious server, causing a Denial of Service of
        the daemon in both cases.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/200806-08"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All OpenSSL users should upgrade to the latest version:
        # emerge --sync
        # emerge --ask --oneshot --verbose '>=dev-libs/openssl-0.9.8g-r2'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(189, 287);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:openssl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/06/23");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/06/24");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"dev-libs/openssl", unaffected:make_list("ge 0.9.8g-r2", "lt 0.9.8f"), vulnerable:make_list("lt 0.9.8g-r2"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "OpenSSL");
    }
    
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2008-210-08.NASL
    descriptionNew openssl packages are available for Slackware 11.0, 12.0, 12.1, and -current to fix security issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id33753
    published2008-07-29
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/33753
    titleSlackware 11.0 / 12.0 / 12.1 / current : openssl (SSA:2008-210-08)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Slackware Security Advisory 2008-210-08. The text 
    # itself is copyright (C) Slackware Linux, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(33753);
      script_version("1.18");
      script_cvs_date("Date: 2019/10/25 13:36:21");
    
      script_cve_id("CVE-2008-0891", "CVE-2008-1672");
      script_bugtraq_id(29405);
      script_xref(name:"SSA", value:"2008-210-08");
    
      script_name(english:"Slackware 11.0 / 12.0 / 12.1 / current : openssl (SSA:2008-210-08)");
      script_summary(english:"Checks for updated packages in /var/log/packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Slackware host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "New openssl packages are available for Slackware 11.0, 12.0, 12.1,
    and -current to fix security issues."
      );
      # http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.562004
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?a52e1366"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected openssh, openssl and / or openssl-solibs packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(189, 287);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:openssh");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:openssl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:openssl-solibs");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:11.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:12.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:12.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/07/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/07/29");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc.");
      script_family(english:"Slackware Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Slackware/release", "Host/Slackware/packages");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("slackware.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Slackware/release")) audit(AUDIT_OS_NOT, "Slackware");
    if (!get_kb_item("Host/Slackware/packages")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Slackware", cpu);
    
    
    flag = 0;
    if (slackware_check(osver:"11.0", pkgname:"openssh", pkgver:"5.1p1", pkgarch:"i486", pkgnum:"1_slack11.0")) flag++;
    if (slackware_check(osver:"11.0", pkgname:"openssl", pkgver:"0.9.8h", pkgarch:"i486", pkgnum:"1_slack11.0")) flag++;
    if (slackware_check(osver:"11.0", pkgname:"openssl-solibs", pkgver:"0.9.8h", pkgarch:"i486", pkgnum:"1_slack11.0")) flag++;
    
    if (slackware_check(osver:"12.0", pkgname:"openssh", pkgver:"5.1p1", pkgarch:"i486", pkgnum:"1_slack12.0")) flag++;
    if (slackware_check(osver:"12.0", pkgname:"openssl", pkgver:"0.9.8h", pkgarch:"i486", pkgnum:"1_slack12.0")) flag++;
    if (slackware_check(osver:"12.0", pkgname:"openssl-solibs", pkgver:"0.9.8h", pkgarch:"i486", pkgnum:"1_slack12.0")) flag++;
    
    if (slackware_check(osver:"12.1", pkgname:"openssh", pkgver:"5.1p1", pkgarch:"i486", pkgnum:"1_slack12.1")) flag++;
    if (slackware_check(osver:"12.1", pkgname:"openssl", pkgver:"0.9.8h", pkgarch:"i486", pkgnum:"1_slack12.1")) flag++;
    if (slackware_check(osver:"12.1", pkgname:"openssl-solibs", pkgver:"0.9.8h", pkgarch:"i486", pkgnum:"1_slack12.1")) flag++;
    
    if (slackware_check(osver:"current", pkgname:"openssh", pkgver:"5.1p1", pkgarch:"i486", pkgnum:"1")) flag++;
    if (slackware_check(osver:"current", pkgname:"openssl", pkgver:"0.9.8h", pkgarch:"i486", pkgnum:"1")) flag++;
    if (slackware_check(osver:"current", pkgname:"openssl-solibs", pkgver:"0.9.8h", pkgarch:"i486", pkgnum:"1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:slackware_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0033_OPENSSL.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has openssl packages installed that are affected by multiple vulnerabilities: - OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an error state mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected. (CVE-2017-3737) - There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository. (CVE-2017-3738) - There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen. (CVE-2017-3736) - OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition. (CVE-2006-2937) - OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) public exponent or (2) public modulus values in X.509 certificates that require extra time to process when using RSA signature verification. (CVE-2006-2940) - Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers. (CVE-2006-3738) - OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. (CVE-2006-4339) - The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference. (CVE-2006-4343) - The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys. (CVE-2007-3108) - Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors. (CVE-2007-4995) - Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible. (CVE-2007-5135) - Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information. (CVE-2008-0891) - OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses particular cipher suites, which triggers a NULL pointer dereference. (CVE-2008-1672) - The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of future epoch DTLS records that are buffered in a queue, aka DTLS record buffer limitation bug. (CVE-2009-1377) - Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka DTLS fragment handling memory leak. (CVE-2009-1378) - Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate. (CVE-2009-1379) - The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post- renegotiation context, related to a plaintext injection attack, aka the Project Mogul issue. (CVE-2009-3555) - Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678. (CVE-2009-4355) - The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors. (CVE-2010-0742) - RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors. NOTE: some of these details are obtained from third party information. (CVE-2010-1633) - Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi- threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap- based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography. (CVE-2010-3864) - OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier. (CVE-2010-4180) - ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka OCSP stapling vulnerability. (CVE-2011-0014) - crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past. (CVE-2011-3207) - OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108. (CVE-2012-0050) - The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. (CVE-2012-2110) - The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. (CVE-2013-4353) - The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client. (CVE-2013-6449) - The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c. (CVE-2013-6450) - An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. (CVE-2014-0160) - A flaw was found in the way SSL 3.0 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. (CVE-2014-3566) - A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127201
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127201
    titleNewStart CGSL CORE 5.04 / MAIN 5.04 : openssl Multiple Vulnerabilities (NS-SA-2019-0033)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # The descriptive text and package checks in this plugin were
    # extracted from ZTE advisory NS-SA-2019-0033. The text
    # itself is copyright (C) ZTE, Inc.
    
    include("compat.inc");
    
    if (description)
    {
      script_id(127201);
      script_version("1.3");
      script_cvs_date("Date: 2019/09/24 11:01:33");
    
      script_cve_id(
        "CVE-2006-2937",
        "CVE-2006-2940",
        "CVE-2006-3738",
        "CVE-2006-4339",
        "CVE-2006-4343",
        "CVE-2007-3108",
        "CVE-2007-4995",
        "CVE-2007-5135",
        "CVE-2008-0891",
        "CVE-2008-1672",
        "CVE-2009-1377",
        "CVE-2009-1378",
        "CVE-2009-1379",
        "CVE-2009-3555",
        "CVE-2009-4355",
        "CVE-2010-0742",
        "CVE-2010-1633",
        "CVE-2010-3864",
        "CVE-2010-4180",
        "CVE-2011-0014",
        "CVE-2011-3207",
        "CVE-2012-0050",
        "CVE-2012-2110",
        "CVE-2013-4353",
        "CVE-2013-6449",
        "CVE-2013-6450",
        "CVE-2014-0160",
        "CVE-2014-3566",
        "CVE-2016-2183",
        "CVE-2017-3736",
        "CVE-2017-3737",
        "CVE-2017-3738"
      );
      script_bugtraq_id(92630);
    
      script_name(english:"NewStart CGSL CORE 5.04 / MAIN 5.04 : openssl Multiple Vulnerabilities (NS-SA-2019-0033)");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote machine is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has openssl packages installed that are affected
    by multiple vulnerabilities:
    
      - OpenSSL 1.0.2 (starting from version 1.0.2b) introduced
        an error state mechanism. The intent was that if a
        fatal error occurred during a handshake then OpenSSL
        would move into the error state and would immediately
        fail if you attempted to continue the handshake. This
        works as designed for the explicit handshake functions
        (SSL_do_handshake(), SSL_accept() and SSL_connect()),
        however due to a bug it does not work correctly if
        SSL_read() or SSL_write() is called directly. In that
        scenario, if the handshake fails then a fatal error will
        be returned in the initial function call. If
        SSL_read()/SSL_write() is subsequently called by the
        application for the same SSL object then it will succeed
        and the data is passed without being decrypted/encrypted
        directly from the SSL/TLS record layer. In order to
        exploit this issue an application bug would have to be
        present that resulted in a call to
        SSL_read()/SSL_write() being issued after having already
        received a fatal error. OpenSSL version 1.0.2b-1.0.2m
        are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is
        not affected. (CVE-2017-3737)
    
      - There is an overflow bug in the AVX2 Montgomery
        multiplication procedure used in exponentiation with
        1024-bit moduli. No EC algorithms are affected. Analysis
        suggests that attacks against RSA and DSA as a result of
        this defect would be very difficult to perform and are
        not believed likely. Attacks against DH1024 are
        considered just feasible, because most of the work
        necessary to deduce information about a private key may
        be performed offline. The amount of resources required
        for such an attack would be significant. However, for an
        attack on TLS to be meaningful, the server would have to
        share the DH1024 private key among multiple clients,
        which is no longer an option since CVE-2016-0701. This
        only affects processors that support the AVX2 but not
        ADX extensions like Intel Haswell (4th generation).
        Note: The impact from this issue is similar to
        CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL
        version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected.
        Fixed in OpenSSL 1.0.2n. Due to the low severity of this
        issue we are not issuing a new release of OpenSSL 1.1.0
        at this time. The fix will be included in OpenSSL 1.1.0h
        when it becomes available. The fix is also available in
        commit e502cc86d in the OpenSSL git repository.
        (CVE-2017-3738)
    
      - There is a carry propagating bug in the x86_64
        Montgomery squaring procedure in OpenSSL before 1.0.2m
        and 1.1.0 before 1.1.0g. No EC algorithms are affected.
        Analysis suggests that attacks against RSA and DSA as a
        result of this defect would be very difficult to perform
        and are not believed likely. Attacks against DH are
        considered just feasible (although very difficult)
        because most of the work necessary to deduce information
        about a private key may be performed offline. The amount
        of resources required for such an attack would be very
        significant and likely only accessible to a limited
        number of attackers. An attacker would additionally need
        online access to an unpatched system using the target
        private key in a scenario with persistent DH parameters
        and a private key that is shared between multiple
        clients. This only affects processors that support the
        BMI1, BMI2 and ADX extensions like Intel Broadwell (5th
        generation) and later or AMD Ryzen. (CVE-2017-3736)
    
      - OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d
        allows remote attackers to cause a denial of service
        (infinite loop and memory consumption) via malformed
        ASN.1 structures that trigger an improperly handled
        error condition. (CVE-2006-2937)
    
      - OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and
        earlier versions allows attackers to cause a denial of
        service (CPU consumption) via parasitic public keys with
        large (1) public exponent or (2) public modulus
        values in X.509 certificates that require extra time to
        process when using RSA signature verification.
        (CVE-2006-2940)
    
      - Buffer overflow in the SSL_get_shared_ciphers function
        in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and
        earlier versions has unspecified impact and remote
        attack vectors involving a long list of ciphers.
        (CVE-2006-3738)
    
      - OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8
        before 0.9.8c, when using an RSA key with exponent 3,
        removes PKCS-1 padding before generating a hash, which
        allows remote attackers to forge a PKCS #1 v1.5
        signature that is signed by that RSA key and prevents
        OpenSSL from correctly verifying X.509 and other
        certificates that use PKCS #1. (CVE-2006-4339)
    
      - The get_server_hello function in the SSLv2 client code
        in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and
        earlier versions allows remote servers to cause a denial
        of service (client crash) via unknown vectors that
        trigger a null pointer dereference. (CVE-2006-4343)
    
      - The BN_from_montgomery function in crypto/bn/bn_mont.c
        in OpenSSL 0.9.8e and earlier does not properly perform
        Montgomery multiplication, which might allow local users
        to conduct a side-channel attack and retrieve RSA
        private keys. (CVE-2007-3108)
    
      - Off-by-one error in the DTLS implementation in OpenSSL
        0.9.8 before 0.9.8f allows remote attackers to execute
        arbitrary code via unspecified vectors. (CVE-2007-4995)
    
      - Off-by-one error in the SSL_get_shared_ciphers function
        in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f,
        might allow remote attackers to execute arbitrary code
        via a crafted packet that triggers a one-byte buffer
        underflow. NOTE: this issue was introduced as a result
        of a fix for CVE-2006-3738. As of 20071012, it is
        unknown whether code execution is possible.
        (CVE-2007-5135)
    
      - Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g,
        when the TLS server name extensions are enabled, allows
        remote attackers to cause a denial of service (crash)
        via a malformed Client Hello packet. NOTE: some of these
        details are obtained from third party information.
        (CVE-2008-0891)
    
      - OpenSSL 0.9.8f and 0.9.8g allows remote attackers to
        cause a denial of service (crash) via a TLS handshake
        that omits the Server Key Exchange message and uses
        particular cipher suites, which triggers a NULL
        pointer dereference. (CVE-2008-1672)
    
      - The dtls1_buffer_record function in ssl/d1_pkt.c in
        OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote
        attackers to cause a denial of service (memory
        consumption) via a large series of future epoch DTLS
        records that are buffered in a queue, aka DTLS record
        buffer limitation bug. (CVE-2009-1377)
    
      - Multiple memory leaks in the
        dtls1_process_out_of_seq_message function in
        ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8
        versions allow remote attackers to cause a denial of
        service (memory consumption) via DTLS records that (1)
        are duplicates or (2) have sequence numbers much greater
        than current sequence numbers, aka DTLS fragment
        handling memory leak. (CVE-2009-1378)
    
      - Use-after-free vulnerability in the
        dtls1_retrieve_buffered_fragment function in
        ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote
        attackers to cause a denial of service (openssl s_client
        crash) and possibly have unspecified other impact via a
        DTLS packet, as demonstrated by a packet from a server
        that uses a crafted server certificate. (CVE-2009-1379)
    
      - The TLS protocol, and the SSL protocol 3.0 and possibly
        earlier, as used in Microsoft Internet Information
        Services (IIS) 7.0, mod_ssl in the Apache HTTP Server
        2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5
        and earlier, Mozilla Network Security Services (NSS)
        3.12.4 and earlier, multiple Cisco products, and other
        products, does not properly associate renegotiation
        handshakes with an existing connection, which allows
        man-in-the-middle attackers to insert data into HTTPS
        sessions, and possibly other types of sessions protected
        by TLS or SSL, by sending an unauthenticated request
        that is processed retroactively by a server in a post-
        renegotiation context, related to a plaintext
        injection attack, aka the Project Mogul issue.
        (CVE-2009-3555)
    
      - Memory leak in the zlib_stateful_finish function in
        crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and
        1.0.0 Beta through Beta 4 allows remote attackers to
        cause a denial of service (memory consumption) via
        vectors that trigger incorrect calls to the
        CRYPTO_cleanup_all_ex_data function, as demonstrated by
        use of SSLv3 and PHP with the Apache HTTP Server, a
        related issue to CVE-2008-1678. (CVE-2009-4355)
    
      - The Cryptographic Message Syntax (CMS) implementation in
        crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x
        before 1.0.0a does not properly handle structures that
        contain OriginatorInfo, which allows context-dependent
        attackers to modify invalid memory locations or conduct
        double-free attacks, and possibly execute arbitrary
        code, via unspecified vectors. (CVE-2010-0742)
    
      - RSA verification recovery in the EVP_PKEY_verify_recover
        function in OpenSSL 1.x before 1.0.0a, as used by
        pkeyutl and possibly other applications, returns
        uninitialized memory upon failure, which might allow
        context-dependent attackers to bypass intended key
        requirements or obtain sensitive information via
        unspecified vectors. NOTE: some of these details are
        obtained from third party information. (CVE-2010-1633)
    
      - Multiple race conditions in ssl/t1_lib.c in OpenSSL
        0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-
        threading and internal caching are enabled on a TLS
        server, might allow remote attackers to execute
        arbitrary code via client data that triggers a heap-
        based buffer overflow, related to (1) the TLS server
        name extension and (2) elliptic curve cryptography.
        (CVE-2010-3864)
    
      - OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when
        SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does
        not properly prevent modification of the ciphersuite in
        the session cache, which allows remote attackers to
        force the downgrade to an unintended cipher via vectors
        involving sniffing network traffic to discover a session
        identifier. (CVE-2010-4180)
    
      - ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0
        through 1.0.0c allows remote attackers to cause a denial
        of service (crash), and possibly obtain sensitive
        information in applications that use OpenSSL, via a
        malformed ClientHello handshake message that triggers an
        out-of-bounds memory access, aka OCSP stapling
        vulnerability. (CVE-2011-0014)
    
      - crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e
        does not initialize certain structure members, which
        makes it easier for remote attackers to bypass CRL
        validation by using a nextUpdate value corresponding to
        a time in the past. (CVE-2011-3207)
    
      - OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS
        applications, which allows remote attackers to cause a
        denial of service (crash) via unspecified vectors
        related to an out-of-bounds read. NOTE: this
        vulnerability exists because of an incorrect fix for
        CVE-2011-4108. (CVE-2012-0050)
    
      - The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c
        in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1
        before 1.0.1a does not properly interpret integer data,
        which allows remote attackers to conduct buffer overflow
        attacks, and cause a denial of service (memory
        corruption) or possibly have unspecified other impact,
        via crafted DER data, as demonstrated by an X.509
        certificate or an RSA public key. (CVE-2012-2110)
    
      - The ssl3_take_mac function in ssl/s3_both.c in OpenSSL
        1.0.1 before 1.0.1f allows remote TLS servers to cause a
        denial of service (NULL pointer dereference and
        application crash) via a crafted Next Protocol
        Negotiation record in a TLS handshake. (CVE-2013-4353)
    
      - The ssl_get_algorithm2 function in ssl/s3_lib.c in
        OpenSSL before 1.0.2 obtains a certain version number
        from an incorrect data structure, which allows remote
        attackers to cause a denial of service (daemon crash)
        via crafted traffic from a TLS 1.2 client.
        (CVE-2013-6449)
    
      - The DTLS retransmission implementation in OpenSSL 1.0.0
        before 1.0.0l and 1.0.1 before 1.0.1f does not properly
        maintain data structures for digest and encryption
        contexts, which might allow man-in-the-middle attackers
        to trigger the use of a different context and cause a
        denial of service (application crash) by interfering
        with packet delivery, related to ssl/d1_both.c and
        ssl/t1_enc.c. (CVE-2013-6450)
    
      - An information disclosure flaw was found in the way
        OpenSSL handled TLS and DTLS Heartbeat Extension
        packets. A malicious TLS or DTLS client or server could
        send a specially crafted TLS or DTLS Heartbeat packet to
        disclose a limited portion of memory per request from a
        connected client or server. Note that the disclosed
        portions of memory could potentially include sensitive
        information such as private keys. (CVE-2014-0160)
    
      - A flaw was found in the way SSL 3.0 handled padding
        bytes when decrypting messages encrypted using block
        ciphers in cipher block chaining (CBC) mode. This flaw
        allows a man-in-the-middle (MITM) attacker to decrypt a
        selected byte of a cipher text in as few as 256 tries if
        they are able to force a victim application to
        repeatedly send the same data over newly created SSL 3.0
        connections. (CVE-2014-3566)
    
      - A flaw was found in the way the DES/3DES cipher was used
        as part of the TLS/SSL protocol. A man-in-the-middle
        attacker could use this flaw to recover some plaintext
        data by capturing large amounts of encrypted traffic
        between TLS/SSL server and client if the communication
        used a DES/3DES based ciphersuite. (CVE-2016-2183)
    
    Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
    number.");
      script_set_attribute(attribute:"see_also", value:"http://security.gd-linux.com/notice/NS-SA-2019-0033");
      script_set_attribute(attribute:"solution", value:
    "Upgrade the vulnerable CGSL openssl packages. Note that updated packages may not be available yet. Please contact ZTE
    for more information.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2006-3738");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_cwe_id(119, 189, 287, 310, 399);
    
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/09/05");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/07/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/08/12");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"NewStart CGSL Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/ZTE-CGSL/release", "Host/ZTE-CGSL/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/ZTE-CGSL/release");
    if (isnull(release) || release !~ "^CGSL (MAIN|CORE)") audit(AUDIT_OS_NOT, "NewStart Carrier Grade Server Linux");
    
    if (release !~ "CGSL CORE 5.04" &&
        release !~ "CGSL MAIN 5.04")
      audit(AUDIT_OS_NOT, 'NewStart CGSL CORE 5.04 / NewStart CGSL MAIN 5.04');
    
    if (!get_kb_item("Host/ZTE-CGSL/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "NewStart Carrier Grade Server Linux", cpu);
    
    flag = 0;
    
    pkgs = {
      "CGSL CORE 5.04": [
        "openssl-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd",
        "openssl-crypto-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd",
        "openssl-debuginfo-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd",
        "openssl-devel-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd",
        "openssl-libs-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd",
        "openssl-perl-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd",
        "openssl-static-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd"
      ],
      "CGSL MAIN 5.04": [
        "openssl-1.0.2k-12.el7.cgslv5",
        "openssl-debuginfo-1.0.2k-12.el7.cgslv5",
        "openssl-devel-1.0.2k-12.el7.cgslv5",
        "openssl-libs-1.0.2k-12.el7.cgslv5",
        "openssl-perl-1.0.2k-12.el7.cgslv5",
        "openssl-static-1.0.2k-12.el7.cgslv5"
      ]
    };
    pkg_list = pkgs[release];
    
    foreach (pkg in pkg_list)
      if (rpm_check(release:"ZTE " + release, reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openssl");
    }
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2008-107.NASL
    descriptionTesting using the Codenomicon TLS test suite discovered a flaw in the handling of server name extension data in OpenSSL 0.9.8f and OpenSSL 0.9.8g. If OpenSSL has been compiled using the non-default TLS server name extensions, a remote attacker could send a carefully crafted packet to a server application using OpenSSL and cause a crash. (CVE-2008-0891) Testing using the Codenomicon TLS test suite discovered a flaw if the
    last seen2020-06-01
    modified2020-06-02
    plugin id37882
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/37882
    titleMandriva Linux Security Advisory : openssl (MDVSA-2008:107)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-620-1.NASL
    descriptionIt was discovered that OpenSSL was vulnerable to a double-free when using TLS server extensions. A remote attacker could send a crafted packet and cause a denial of service via application crash in applications linked against OpenSSL. Ubuntu 8.04 LTS does not compile TLS server extensions by default. (CVE-2008-0891) It was discovered that OpenSSL could dereference a NULL pointer. If a user or automated system were tricked into connecting to a malicious server with particular cipher suites, a remote attacker could cause a denial of service via application crash. (CVE-2008-1672). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id33389
    published2008-07-02
    reporterUbuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/33389
    titleUbuntu 8.04 LTS : openssl vulnerabilities (USN-620-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2008-4723.NASL
    descriptionFixes moderate impact security issue CVE-2008-0891 and low impact security issue CVE-2008-1672. See also http://www.openssl.org/news/secadv/20080528.txt All applications and system services which utilize OpenSSL library must be restarted for the updates to take effect. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id32484
    published2008-06-02
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/32484
    titleFedora 9 : openssl-0.9.8g-9.fc9 (2008-4723)

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 29405 CVE(CAN) ID: CVE-2008-0891,CVE-2008-1672 OpenSSL是一种开放源码的SSL实现,用来实现网络通信的高强度加密,现在被广泛地用于各种网络应用程序中。 OpenSSL在处理畸形的连接时存在漏洞,远程攻击者可能利用此漏洞导致服务器程序崩溃。 当用以下命令行运行OpenSSL时: openssl s_server -key path_to_key \ -cert path_to_certificate \ -www `openssl ciphers 'ALL:COMPLEMENTOFALL'` 如果接收到的Client Hello报文中服务器名称扩展将server_name设置为0x00且名称长度为1,则程序在325行的ssl/t1_lib.c文件检测到错误的主机名并结束握手,之后试图释放已经释放的指针,导致OpenSSL出现分段错误崩溃。openssl程序默认不允许处理TLS扩展,必须在编译时明确地启用。 在用以下命令行运行openssl时: openssl s_client -connect localhost:4433 -cipher \ `openssl ciphers 'ALL:COMPLEMENTOFALL'` -debug -msg openssl向服务器发送Client Hello消息,服务器用Server Hello消息响应(选择了TLS_DH_ANON_WITH_RC4_128_MD5密码组),然后是Server Hello Done消息(忽略Server Key Exchange消息)。ssl3_get_key_exchange()允许忽略Server Key Exchange消息,但s-&gt;session-&gt;sess_cert为空且ssl3_get_server_done()没有执行任何检查,客户端状态机器继续执行到ssl3_send_client_key_exchange()且没有检查s-&gt;session-&gt;sess_cert的有效性便试图引用(s3_clntl.c:1970)。如果客户端使用特殊的密码组连接到了恶意的服务器,服务器就会导致客户端崩溃。 OpenSSL Project OpenSSL 0.9.8g OpenSSL Project OpenSSL 0.9.8f OpenSSL Project --------------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://www.openssl.org/source/openssl-0.9.8h.tar.gz target=_blank>http://www.openssl.org/source/openssl-0.9.8h.tar.gz</a>
idSSV:3348
last seen2017-11-19
modified2008-05-29
published2008-05-29
reporterRoot
titleOpenSSL多个拒绝服务漏洞

Statements

contributorMark J Cox
lastmodified2008-05-30
organizationRed Hat
statementNot vulnerable. This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.