copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ASB-2009.1125.2 - UPDATED ALERT [Win][UNIX/Linux] OpenSSL: Unauthorised access - Remote/unauthenticated

Date: 08 November 2009
References: ESB-2009.1667  ESB-2009.1562  ESB-2009.1501.2  ESB-2009.1515  ESB-2009.1539  ESB-2009.1544  ESB-2009.1555.2  ESB-2009.1568.2  ASB-2009.1143  ASB-2009.1145  
ESB-2009.1578  ASB-2009.1150  ESB-2009.1584  ESB-2009.1591  ASB-2009.1156  ESB-2009.1674  ESB-2010.0020  ESB-2010.0036.2  ESB-2010.0039  ESB-2010.0052  ASB-2010.0046  
ESB-2010.0187  ASB-2010.0060  ESB-2010.0215  ASB-2010.0073  ESB-2010.0255  ESB-2010.0274  ASB-2010.0112  ASB-2010.0168  ESB-2010.0616  ESB-2010.0691  ESB-2010.0705  
ESB-2010.0780.3  ESB-2010.0842.2  ESB-2010.0883  ESB-2010.0947  ESB-2010.0949  ESB-2010.0964  ESB-2010.0980  ESB-2010.1033  ESB-2010.1054  ASB-2010.0240  ESB-2010.1105.4  
ESB-2010.1164  ESB-2010.1179  ESB-2011.0013  ESB-2011.0014  ESB-2011.0015  ESB-2011.0030  ESB-2011.0655  ESB-2011.0779  ESB-2011.1133  ESB-2012.0383  ESB-2012.0423  
ESB-2012.0747  ESB-2013.0216  
Related Files: ASB-2009.1125  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                              ASB-2009.1125.2
                          OpenSSL 0.9.8l Released
                              9 November 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              OpenSSL
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Unauthorised Access            -- Remote/Unauthenticated
                      Provide Misleading Information -- Remote/Unauthenticated
Resolution:           Mitigation
CVE Names:            CVE-2009-3555  
Member content until: Wednesday, December  9 2009

Comment: This release from OpenSSL disables the vulnerable phase and as such
         would cause configurations that depend on renegotiation to fail.
         Be sure to test before deploying this mitigation to live systems.

Revision History:     November 9 2009: Corrected resolution, added comment
                      November 9 2009: Initial Release

OVERVIEW

        A vulnerability has been identified in OpenSSL where a Man in the 
        Middle attack could be exploited during the renegotiation phase. 
        A new version of OpenSSL has been released to mitigate this
        vulnerability


IMPACT

        The release notes of the latest version (0.9.8l) [1] detail the
        following fix:
        
           Disable renegotiation completely - this fixes a severe security
           problem (CVE-2009-3555) at the cost of breaking all
           renegotiation. Renegotiation can be re-enabled by setting
           SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION in s3->flags at
           run-time. This is really not recommended unless you know what
           you're doing.
        
        This release is the result of what is now a public vulnerability in
        the renegotiating phase of OpenSSL [2]


MITIGATION

        Users can download version 0.9.8l from the vendor's website. [3]


REFERENCES

        [1] OpenSSL 0.9.8l
            http://www.openssl.org/source/openssl-0.9.8l.tar.gz

        [2] Renegotiating TLS
            http://extendedsubset.com/?p=8

        [3] OpenSSL: Source, Tarballs
            http://www.openssl.org/source/

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFK97Z7NVH5XJJInbgRAncvAJ4shz1ZXGSUaBtarIbqKgRlX9kByQCeMvOo
VOwFbRdfcIDO0XlJStyiLX4=
=Wg8a
-----END PGP SIGNATURE-----