Bosch CERT Advisory: OpenSSL Multiple Vulnerabilities

Bug #1921485 reported by it0001
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
openssl (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

Description

Multiple vulnerabilities have been reported in OpenSSL, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).

1

An error when validating CA certificates can be exploited to bypass certificate validation checks.

Successful exploitation of the vulnerability #1 requires the X509_V_FLAG_X509_STRICT flag to be enabled (not enabled by default) and an application to either not set a purpose for certificate verification or override the default purpose.

2

A NULL-pointer deference error when handling renegotiation ClientHello messages can be exploited to crash the OpenSSL TLS server.

Successful exploitation of the vulnerability #2 requires an OpenSSL server with TLSv1.2 and renegotiation enabled (enabled by default).

The vulnerabilities are reported in versions prior to 1.1.1k.

Affected Software

The following software is affected by the described vulnerability. Please check the vendor links below to see if exactly your version is affected.

OpenSSL 1.x

Solution

Update to version 1.1.1k.

References

1. https://www.openssl.org/news/vulnerabilities.html <https://www.openssl.org/news/vulnerabilities.html>
2. https://www.openssl.org/news/secadv/20210325.txt <https://www.openssl.org/news/secadv/20210325.txt>

Please provide a fix as soon as possible.

CVE References

Revision history for this message
Steve Beattie (sbeattie) wrote :
information type: Private Security → Public Security
Changed in openssl (Ubuntu):
status: New → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.