Linux Security
    Linux Security
    Linux Security

    Debian: openssl denial of service

    Posted By
    There are a number of errors in the ASN1 code.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 393-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                              Michael Stone
    October 1, 2003                
    - --------------------------------------------------------------------------
    Package        : openssl
    Vulnerability  : denial of service
    Problem-Type   : remote
    Debian-specific: no
    CVE Ids        : CAN-2003-0543 CAN-2003-0544
    Dr. Stephen Henson (This email address is being protected from spambots. You need JavaScript enabled to view it.), using a test suite provided by
    NISCC (, discovered a number of errors in the OpenSSL
    ASN1 code.  Combined with an error that causes the OpenSSL code to parse
    client certificates even when it should not, these errors can cause a
    denial of service (DoS) condition on a system using the OpenSSL code, 
    depending on how that code is used. For example, even though apache-ssl
    and ssh link to OpenSSL libraries, they should not be affected by this
    vulnerability. However, other SSL-enabled applications may be
    vulnerable and an OpenSSL upgrade is recommended.
    For the current stable distribution (woody) these problems have been
    fixed in version 0.9.6c-2.woody.4
    For the unstable distribution (sid) these problems have been fixed in
    version 0.9.7c-1
    We recommend that you update your openssl package. Note that you will
    need to restart services which use the libssl library for this update
    to take effect.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      675 76da6f792eccfa0e219a0bb42296546f
          Size/MD5 checksum:  2153980 c8261d93317635d56df55650c6aeb3dc
          Size/MD5 checksum:    44514 c07ae1f584c7a8bc4d0a821b8e6801ab
      Architecture independent packages:
          Size/MD5 checksum:      970 734c96f61a7d7032584ce001811d99ce
      Alpha architecture:
          Size/MD5 checksum:  1551438 add644f20298bb07dd2368f6139e03bd
          Size/MD5 checksum:   571194 17117f28911fee940def4cc5a5168ebf
          Size/MD5 checksum:   736296 f571a65a29ea963e9f82b4a70cc61bbc
      ARM architecture:
          Size/MD5 checksum:   474030 c34ae889a0b0b05d16ab071069886ee8
          Size/MD5 checksum:  1357972 7b5efab549fcace562b1df40f58eb434
          Size/MD5 checksum:   729736 bea9047ba98358b5d843ec5502c08d14
      HP Precision architecture:
          Size/MD5 checksum:  1435088 64ec697612a1a8bb7ec02a8dfe0f082a
          Size/MD5 checksum:   564870 7c9f44efb6fbf092a4c6285438f4218f
          Size/MD5 checksum:   741856 c593ae8279de436da67de14a147b991c
      Intel IA-32 architecture:
          Size/MD5 checksum:   461714 9c291cab723133eb1c7c2309540dd9e2
          Size/MD5 checksum:   721748 654531d126d43611b236964e691b67e2
          Size/MD5 checksum:  1289866 0b05581c2d1c03f72644737aa7c37fe9
      Intel IA-64 architecture:
          Size/MD5 checksum:   763482 0292998feaac6ea041d2d044305b7715
          Size/MD5 checksum:   711022 dbfc0819492111ff1b8040c4dc615d03
          Size/MD5 checksum:  1615238 74a9e23d5f17d9a4f40120d1103bfeb2
      Motorola 680x0 architecture:
          Size/MD5 checksum:   720358 293043604c8e259a058f5e1d5925a96e
          Size/MD5 checksum:   450572 5ebfb9bc4f0da2986373032213e22f3d
          Size/MD5 checksum:  1266566 5d8c56beaaa413dd72d3cf90b5b30349
      Big endian MIPS architecture:
          Size/MD5 checksum:   717764 d7019cf6cf0d6618f8789c8290697367
          Size/MD5 checksum:  1416184 09aa020367ef0d06e3e22e550ea12102
          Size/MD5 checksum:   483650 3008bbee5c4f7f5faf344317c59e0d82
      Little endian MIPS architecture:
          Size/MD5 checksum:   717060 3180c04a1cb7dd325b06496ca2bff71b
          Size/MD5 checksum:  1410226 35cc9bc327c59471f5a909878efdbb76
          Size/MD5 checksum:   476638 bb83a9bfc07679fbe21aab5abd56256f
      PowerPC architecture:
          Size/MD5 checksum:  1386776 f379528eae7a157bd830ea43a371efe4
          Size/MD5 checksum:   726638 45d8adac74a907263e7507f64fd3c3e3
          Size/MD5 checksum:   502422 a386a0fdd637da29848219a1ca16eae1
      IBM S/390 architecture:
          Size/MD5 checksum:   510438 4044c7c34e45d3b9b7f3ef69eacae491
          Size/MD5 checksum:   731592 79fe91bb12f87b2dc05a4dff2aba1a10
          Size/MD5 checksum:  1326384 0352ce5cd87305074b2fdc91e78badca
      Sun Sparc architecture:
          Size/MD5 checksum:   484720 99bace5e1758b19404ef0ab618f37048
          Size/MD5 checksum:  1344194 2290093fa5e49278491fdbe03f14ab1a
          Size/MD5 checksum:   737150 28a4ebcf466e4c4d8aaa0afe974e9893
      These files will probably be moved into the stable distribution on
      its next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"2","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.