Rapid7 Vulnerability & Exploit Database

RHSA-2016:0302: openssl security update

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

RHSA-2016:0302: openssl security update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
03/01/2016
Created
07/25/2018
Added
03/03/2016
Modified
03/21/2018

Description

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)and Transport Layer Security (TLS v1) protocols, as well as afull-strength, general purpose cryptography library.A padding oracle flaw was found in the Secure Sockets Layer version 2.0(SSLv2) protocol. An attacker can potentially use this flaw to decryptRSA-encrypted cipher text from a connection using a newer SSL/TLS protocolversion, allowing them to decrypt such connections. This cross-protocolattack is publicly referred to as DROWN. (CVE-2016-0800)Note: This issue was addressed by disabling the SSLv2 protocol by defaultwhen using the 'SSLv23' connection methods, and removing support for weakSSLv2 cipher suites. It is possible to re-enable the SSLv2 protocol in the'SSLv23' connection methods by default by setting the OPENSSL_ENABLE_SSL2environment variable before starting an application that needs to haveSSLv2 enabled. For more information, refer to the knowledge base articlelinked to in the References section.A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2ciphers that have been disabled on the server. This could result in weakSSLv2 ciphers being used for SSLv2 connections, making them vulnerable toman-in-the-middle attacks. (CVE-2015-3197)An integer overflow flaw, leading to a NULL pointer dereference or aheap-based memory corruption, was found in the way some BIGNUM functions ofOpenSSL were implemented. Applications that use these functions with largeuntrusted input could crash or, potentially, execute arbitrary code.(CVE-2016-0797)Red Hat would like to thank the OpenSSL project for reporting these issues.Upstream acknowledges Nimrod Aviram and Sebastian Schinzel as the originalreporters of CVE-2016-0800 and CVE-2015-3197; and Guido Vranken as theoriginal reporter of CVE-2016-0797.All openssl users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. For the update to takeeffect, all services linked to the OpenSSL library must be restarted, orthe system rebooted.

Solution(s)

  • redhat-upgrade-openssl
  • redhat-upgrade-openssl-debuginfo
  • redhat-upgrade-openssl-devel
  • redhat-upgrade-openssl-perl

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;