News: Cexx forums, with volunteers dedicated to helping you remove malware and stay protected
 
Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
October 22, 2014, 15:53:56
Pages: [1]   Go Down
  Print  
Topic: OpenSSL v0.9.8l released  (Read 1053 times)
0 Members and 1 Guest are viewing this topic.
« on: November 06, 2009, 17:14:35 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8345



FYI...

New version of OpenSSL released - OpenSSL 0.9.8l
- http://isc.sans.org/diary.html?storyid=7543
Last Updated: 2009-11-06 22:43:05 UTC - "Due to the recent publishing of information regarding a TLS/SSL protocol vulnerability (previous ISC diary entry can be found here http://isc.sans.org/diary.html?storyid=7534 ) OpenSSL has released a new version (OpenSSL 0.9.8l). It should be noted that this update does not "fix" the vulnerability in the protocol. It appears that they have made the choice to simply remove TLS/SSL renegotiation from their package by default... There will no doubt be instances where clients/servers will cease to function properly when renegotiation is disabled or removed. The nice thing about what OpenSSL has done is if you do run into issues, it appears to be an easy fix (set a flag and -hup!). So as always, make sure to test vigorously before you deploy! You can get this new version of OpenSSL at the link below:
http://www.openssl.org/source/
Release note from OpenSSL package:
'Disable renegotiation completely - this fixes a severe security problem (CVE-2009-3555) at the cost of breaking all renegotiation. Renegotiation can be re-enabled by setting  SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION in s3->flags at run-time. This is really not recommended unless you know what you're doing. [Ben Laurie]'
... Let us not forget that not all traffic that is TLS/SSL encrypted is HTTP. Just off the top of my head I can think of LDAP, MSSQL, Email, and let us not forget SSL VPNS! Since this is a bug in a low lying protocol that higher level applications/protocols rely on there will no doubt be allot of interest issues raised. No doubt plenty of people including myself will have a busy weekend rereading the TLS specification. For those who are bored, feel free to read that specification at the URL below:
TLS 1.0: http://www.ietf.org/rfc/rfc2246.txt
SSL 3.0: http://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00 "

- http://www.us-cert.gov/current/#ssl_and_tls_vulnerable_to
November 6, 2009

- http://blogs.iss.net/archive/stealingcookieswiths.html
November 12, 2009

 Exclamation
« Last Edit: November 16, 2009, 02:23:12 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #1 on: November 17, 2009, 11:53:25 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8345



FYI...

OpenVPN fixed OpenSSL session renegotiation issue
- http://isc.sans.org/diary.html?storyid=7603
Last Updated: 2009-11-17 14:59:46 UTC - "OpenVPN released an update to respond to the OpenSSL vulnerability described in CVE-2009-3555*. OpenVPN has identified a vulnerability caused by an error in OpenSSL which could be exploited by attackers to manipulate certain data and information.

OpenVPN recommend upgrading to version 2.1_rc21 which is available here:
- http://openvpn.net/index.php/open-source/downloads.html

Additional information regarding OpenVPN session renegotiation is available here:
- http://article.gmane.org/gmane.network.openvpn.devel/2835 "

* http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3555
Last revised:11/17/2009

- http://www.symantec.com/connect/blogs/transport-layer-security-issues
November 16, 2009

 Exclamation
« Last Edit: November 18, 2009, 07:19:54 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
 
Pages: [1]   Go Up
  Print  
 
Jump to:  

Powered by SMF 1.1.20 | SMF © 2013, Simple Machines Page created in 0.186 seconds with 19 queries.