PolarSSL was found to contain high-vulnerability Security Vulnerabilities
Security Report from securityweek: PolarSSL has a high vulnerability that can cause DoS attacks and may be used for remote code execution.
PolarSSL is used in many projects, including OpenVPN, OpenVPN-NL, PowerDNS, Hiawatha, Monkey HTTP Server, and many commercial products. In November 2014, PolarSSL has become part of many semiconductor and software companies.
This high-risk vulnerability (CVE-2015-1182) was discovered by developers of PolarSSL during the internal code review phase and is affected by some specific configurations from version 1.0 to version 1.3.9, if the server does not ask the client certificate, it will not be affected.
PolarSSL writes in a consulting article: when parsing the ASN.1 sequence, the asn1_sequence pointer in the Link List is not initialized in asn1_get_sequence_of (), causing an error during list parsing, the uninitialized pointer is passed to the polarssl_free () function.
This is triggered when the PolarSSL certificate is parsed. Therefore, problems may occur when the client obtains the certificate from the server and the server requires the client certificate.
We recommend that you use the patch provided by PolarSSL for version 1.3.9 or wait for the next version to be updated.
The most common attack scenario is that attackers expose server information by providing an invalid X.509 Certificate, which can cause DoS attacks and be used for remote code execution.
Currently, this vulnerability has been confirmed to be valid for OpenVPN-NL 2.3.5-nl2 and earlier versions. The latest OpenVPN-NL 2.3.5-nl3 version has solved this problem.
OpenVPN Connect for Android 1.1.14 and earlier versions, as well as OpenVPN Connect for iOS 1.0.5 and earlier versions are also affected by this vulnerability. In addition, OpenVPN may also have problems in some specific situations, but it has not been confirmed yet. PowerDNS is not affected.
Recently, various cryptographic libraries have been plagued by disasters!
PolarSSL details: click here
PolarSSL: click here
This article permanently updates the link address: