Arch Linux Security Advisory ASA-201411-4
========================================
Severity: Medium
Date    : 2014-11-06
CVE-ID  : CVE-2014-8627, CVE-2014-8628
Package : polarssl
Type    : multiple issues
Remote  : Yes
Link    : https://wiki.archlinux.org/title/CVE-2014

Summary
======
The package polarssl before version 1.3.9-1 is vulnerable to multiple
issues including weak signature negotiation and remotely triggerable
memory leaks.

Resolution
=========
Upgrade to 1.3.9-1.

# pacman -Syu "polarssl>=1.3.9-1"

The problem has been fixed upstream in version 1.3.9.

Workaround
=========
None.

Description
==========
- CVE-2014-8627 (weak signature negotiation)
A mistake resulted in servers negotiating the lowest common hash from
signature_algorithms extension in TLS 1.2.

- CVE-2014-8628 (memory leaks)
Two issues were found that result in remotely triggerable memory leaks
when parsing crafted ClientHello messages or X.509 certificates.

Impact
=====
A remote attacker is able to trigger memory leaks which may result in
memory exhaustion and therefore denial of service. Additionally due to
weak negotiated signature algorithms an attacker may be able to perform
cryptographic attacks.

References
=========
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8627
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8628
https://www.openwall.com/lists/oss-security/2014/11/04/6
https://github.com/Mbed-TLS/mbedtls/commit/43c3b28
https://github.com/Mbed-TLS/mbedtls/commit/5d8618

ArchLinux: 201411-4: polarssl: multiple issues

November 6, 2014

Summary

- CVE-2014-8627 (weak signature negotiation) A mistake resulted in servers negotiating the lowest common hash from signature_algorithms extension in TLS 1.2. - CVE-2014-8628 (memory leaks) Two issues were found that result in remotely triggerable memory leaks when parsing crafted ClientHello messages or X.509 certificates.

Resolution

Upgrade to 1.3.9-1. # pacman -Syu "polarssl>=1.3.9-1"
The problem has been fixed upstream in version 1.3.9.

References

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8627 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8628 https://www.openwall.com/lists/oss-security/2014/11/04/6 https://github.com/Mbed-TLS/mbedtls/commit/43c3b28 https://github.com/Mbed-TLS/mbedtls/commit/5d8618

Severity
Package : polarssl
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/title/CVE-2014

Workaround

None.

Related News