Debian: openssl denial of service

    Date01 Oct 2003
    CategoryDebian
    2120
    Posted ByLinuxSecurity Advisories
    There are a number of errors in the ASN1 code.
    
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 393-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                              Michael Stone
    October 1, 2003                          http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : openssl
    Vulnerability  : denial of service
    Problem-Type   : remote
    Debian-specific: no
    CVE Ids        : CAN-2003-0543 CAN-2003-0544
    
    Dr. Stephen Henson (This email address is being protected from spambots. You need JavaScript enabled to view it.), using a test suite provided by
    NISCC (www.niscc.gov.uk), discovered a number of errors in the OpenSSL
    ASN1 code.  Combined with an error that causes the OpenSSL code to parse
    client certificates even when it should not, these errors can cause a
    denial of service (DoS) condition on a system using the OpenSSL code, 
    depending on how that code is used. For example, even though apache-ssl
    and ssh link to OpenSSL libraries, they should not be affected by this
    vulnerability. However, other SSL-enabled applications may be
    vulnerable and an OpenSSL upgrade is recommended.
    
    For the current stable distribution (woody) these problems have been
    fixed in version 0.9.6c-2.woody.4
    
    For the unstable distribution (sid) these problems have been fixed in
    version 0.9.7c-1
    
    We recommend that you update your openssl package. Note that you will
    need to restart services which use the libssl library for this update
    to take effect.
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.4.dsc
          Size/MD5 checksum:      675 76da6f792eccfa0e219a0bb42296546f
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c.orig.tar.gz
          Size/MD5 checksum:  2153980 c8261d93317635d56df55650c6aeb3dc
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.4.diff.gz
          Size/MD5 checksum:    44514 c07ae1f584c7a8bc4d0a821b8e6801ab
    
      Architecture independent packages:
    
         http://security.debian.org/pool/updates/main/o/openssl/ssleay_0.9.6c-2.woody.4_all.deb
          Size/MD5 checksum:      970 734c96f61a7d7032584ce001811d99ce
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.4_alpha.deb
          Size/MD5 checksum:  1551438 add644f20298bb07dd2368f6139e03bd
         http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.4_alpha.deb
          Size/MD5 checksum:   571194 17117f28911fee940def4cc5a5168ebf
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.4_alpha.deb
          Size/MD5 checksum:   736296 f571a65a29ea963e9f82b4a70cc61bbc
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.4_arm.deb
          Size/MD5 checksum:   474030 c34ae889a0b0b05d16ab071069886ee8
         http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.4_arm.deb
          Size/MD5 checksum:  1357972 7b5efab549fcace562b1df40f58eb434
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.4_arm.deb
          Size/MD5 checksum:   729736 bea9047ba98358b5d843ec5502c08d14
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.4_hppa.deb
          Size/MD5 checksum:  1435088 64ec697612a1a8bb7ec02a8dfe0f082a
         http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.4_hppa.deb
          Size/MD5 checksum:   564870 7c9f44efb6fbf092a4c6285438f4218f
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.4_hppa.deb
          Size/MD5 checksum:   741856 c593ae8279de436da67de14a147b991c
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.4_i386.deb
          Size/MD5 checksum:   461714 9c291cab723133eb1c7c2309540dd9e2
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.4_i386.deb
          Size/MD5 checksum:   721748 654531d126d43611b236964e691b67e2
         http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.4_i386.deb
          Size/MD5 checksum:  1289866 0b05581c2d1c03f72644737aa7c37fe9
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.4_ia64.deb
          Size/MD5 checksum:   763482 0292998feaac6ea041d2d044305b7715
         http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.4_ia64.deb
          Size/MD5 checksum:   711022 dbfc0819492111ff1b8040c4dc615d03
         http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.4_ia64.deb
          Size/MD5 checksum:  1615238 74a9e23d5f17d9a4f40120d1103bfeb2
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.4_m68k.deb
          Size/MD5 checksum:   720358 293043604c8e259a058f5e1d5925a96e
         http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.4_m68k.deb
          Size/MD5 checksum:   450572 5ebfb9bc4f0da2986373032213e22f3d
         http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.4_m68k.deb
          Size/MD5 checksum:  1266566 5d8c56beaaa413dd72d3cf90b5b30349
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.4_mips.deb
          Size/MD5 checksum:   717764 d7019cf6cf0d6618f8789c8290697367
         http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.4_mips.deb
          Size/MD5 checksum:  1416184 09aa020367ef0d06e3e22e550ea12102
         http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.4_mips.deb
          Size/MD5 checksum:   483650 3008bbee5c4f7f5faf344317c59e0d82
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.4_mipsel.deb
          Size/MD5 checksum:   717060 3180c04a1cb7dd325b06496ca2bff71b
         http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.4_mipsel.deb
          Size/MD5 checksum:  1410226 35cc9bc327c59471f5a909878efdbb76
         http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.4_mipsel.deb
          Size/MD5 checksum:   476638 bb83a9bfc07679fbe21aab5abd56256f
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.4_powerpc.deb
          Size/MD5 checksum:  1386776 f379528eae7a157bd830ea43a371efe4
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.4_powerpc.deb
          Size/MD5 checksum:   726638 45d8adac74a907263e7507f64fd3c3e3
         http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.4_powerpc.deb
          Size/MD5 checksum:   502422 a386a0fdd637da29848219a1ca16eae1
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.4_s390.deb
          Size/MD5 checksum:   510438 4044c7c34e45d3b9b7f3ef69eacae491
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.4_s390.deb
          Size/MD5 checksum:   731592 79fe91bb12f87b2dc05a4dff2aba1a10
         http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.4_s390.deb
          Size/MD5 checksum:  1326384 0352ce5cd87305074b2fdc91e78badca
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.6_0.9.6c-2.woody.4_sparc.deb
          Size/MD5 checksum:   484720 99bace5e1758b19404ef0ab618f37048
         http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.6c-2.woody.4_sparc.deb
          Size/MD5 checksum:  1344194 2290093fa5e49278491fdbe03f14ab1a
         http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.6c-2.woody.4_sparc.deb
          Size/MD5 checksum:   737150 28a4ebcf466e4c4d8aaa0afe974e9893
    
      These files will probably be moved into the stable distribution on
      its next revision.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"67","type":"x","order":"1","pct":57.26,"resources":[]},{"id":"88","title":"Should be more technical","votes":"16","type":"x","order":"2","pct":13.68,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"34","type":"x","order":"3","pct":29.06,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.