"Vulnerability" OpenSSL update

Source: Internet
Author: User
Tags cve dtls

The OpenSSL 1.0.2d and OpenSSL 1.0.1p release, Fixed a security issue (cve-2015-1793).

Security level: High

Affected versions: OpenSSL 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o.

Vulnerability Description: Alternative chains certificate forgery (cve-2015-1793)

OpenSSL Security Advisory [9 Jul 2015]=======================================alternative Chains Certificate Forgery ( cve-2015-1793) ======================================================severity:highduring Certificate Verification , OpenSSL (starting from version 1.0.1n and1.0.2b) would attempt to find a alternative certificate chain if the Firstattem PT to build such a chain fails. An error in the implementation of thislogic can mean, that's attacker could cause certain checks on untrustedcertificates To being bypassed, such as the CA flag, enabling them to use a validleaf certificate to act as a CA and "issue" an invalid CE Rtificate. This issue would impact any application that verifies certificates INCLUDINGSSL/TLS/DTLS clients and SSL/TLS/DTLS servers U Sing client authentication. This issue affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o. OpenSSL 1.0.2B/1.0.2C users should upgrade to 1.0.2dOpenSSL 1.0.1n/1.0.1o users should upgrade to 1.0.1pThis issue was rep Orted to OpenSSL on 24th June by Adam Langley/davidbenjamin (GOOGLE/BORINGSSL). The fix was developed by the BORINGSSL project. Note====as per our previous announcements and our Release strategy (https://www.openssl.org/about/releasestrat.html), Support for OpenSSL versions1.0.0 and 0.9.8 would cease on 31st December 2015. No security updates for thesereleases'll be provided after that date. Users of these releases are advisedto upgrade. References==========url for this Security advisory:https://www.openssl.org/news/secadv_20150709.txtnote:the online Version of the advisory is updated with Additionaldetails over time. For details of the OpenSSL severity classifications please see:https://www.openssl.org/about/secpolicy.html

  

Download: http://www.openssl.org/source/

"Vulnerability" OpenSSL update

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.