Release date:
Updated on: 2013-02-27
Affected Systems:
OpenSSL Project OpenSSL 1.0.1c
OpenSSL Project OpenSSL 1.0.0j
OpenSSL Project OpenSSL 0.9.8X
Description:
--------------------------------------------------------------------------------
Bugtraq id: 57755
CVE (CAN) ID: CVE-2012-2686, CVE-2013-0166
OpenSSL is an open-source SSL implementation that implements high-strength encryption for network communication. It is widely used in various network applications.
OpenSSL 1.0.1c, 1.0.0j, 0.9.8x vulnerability in processing CBC encrypted sockets in TLS 1.1 \ 1.2 On the AES-NI support platform, which can cause DoS attacks. CVE-2012-2686)
OpenSSL versions earlier than 0.9.8y, 1.0.0k, and 1.0.1d do not correctly perform Signature Verification on OCSP responses. Remote attackers can use invalid keys to cause denial of service (empty pointer reference and application crash ). CVE-2013-0166)
<* Source: Adam Langley
Link: https://bugzilla.redhat.com/show_bug.cgi? CVE-2012-2686
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
OpenSSL Project
---------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.openssl.org/