OpenSSL fixes two high-risk Vulnerabilities
Two new versions 1.0.1t and 1.0.2h are released in the widely used encryption library OpenSSL, which fix two high-risk vulnerabilities that allow attackers to decrypt logon creden。 or execute malicious code on Web servers. Decryption vulnerability is caused by a vulnerability known as Padding Oracle that allows attackers to repeatedly check the encryption load to find clues to the plaintext content in it, the vulnerability number CVE-2016-2107, the irony is that this vulnerability was introduced when another Padding Oracle bug named Lucky 13 was fixed in 2013. The second high-risk vulnerability could cause memory corruption, allowing attackers to execute code, numbered as a CVE-2016-2108, in the OpenSSL ASN.1 encoder.
For more information about OpenSSL, see the following links:
Use OpenSSL command line to build CA and Certificate
Install OpenSSL in Ubuntu
Provides FTP + SSL/TLS authentication through OpenSSL and implements secure data transmission.
Use OpenSSL to generate certificates in Linux
Use OpenSSL to sign multi-domain certificates
Add a custom encryption algorithm to OpenSSL
OpenSSL details: click here
OpenSSL: click here
This article permanently updates the link address: