漏洞信息详情
OpenSSL ASN.1多个解析安全漏洞
- CNNVD编号:CNNVD-200311-040
- 危害等级: 中危
- CVE编号:
CVE-2003-0544
- 漏洞类型:
未知
- 发布时间:
2003-09-30
- 威胁类型:
远程
- 更新时间:
2010-01-28
- 厂 商:
openssl - 漏洞来源:
NISCC uniras@niscc… -
漏洞简介
OpenSSL是OpenSSL团队开发的一个开源的能够实现安全套接层(SSL v2/v3)和安全传输层(TLS v1)协议的通用加密库,它支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。
OpenSSL中的ASN.1解析代码存在多个问题,远程攻击者可以利用这个漏洞对系统进行拒绝服务攻击或执行任意代码。
漏洞问题如下:
1、部分ASN.1编码被解析器会由于非法而拒绝,当处理对应的数据结构时会触发错误而破坏堆栈,这可用于远程拒绝服务。目前还不清楚是否可用于执行任意代码。此漏洞不影响OpenSSL 0.9.6版本。
2、不正确ASN.1标记值可在部分条件下引起读取非法边界值(整数溢出问题),可导致拒绝服务漏洞。
3、如果设置成忽略公钥解码错误,证书中包含畸形公钥会引起服务崩溃。公钥解码错误一般不忽略(除非在调试情况下)。目前还不清楚是否可利用执行任意代码。
4、由于在SSL/TLS协议处理上存在错误,当没有指定请求时服务器也会解析客户端证书。这严格的来说不是一个漏洞,但是这意味着使用OpenSSL的SSL/TLS服务器可使用漏洞1,2,3进行攻击,即使没有启用客户端验证的情况下。
漏洞公告
厂商补丁:
Debian
——
Debian已经为此发布了一个安全公告(DSA-394-1)以及相应补丁:
DSA-394-1:New openssl095 packages fix denial of service
链接:http://www.debian.org/security/2002/dsa-394” target=”_blank”>
http://www.debian.org/security/2002/dsa-394
补丁下载:
Source archives:
http://security.debian.org/pool/updates/main/o/openssl095/openssl095_0.9.5a-6.woody.3.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/o/openssl095/openssl095_0.9.5a-6.woody.3.dsc
Size/MD5 checksum: 631 ba6e597ab2db2984aef6c2a765ac29c0
http://security.debian.org/pool/updates/main/o/openssl095/openssl095_0.9.5a-6.woody.3.diff.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/o/openssl095/openssl095_0.9.5a-6.woody.3.diff.gz
Size/MD5 checksum: 38851 6b197111a7068a7ea29ef55176771d89
http://security.debian.org/pool/updates/main/o/openssl095/openssl095_0.9.5a.orig.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/o/openssl095/openssl095_0.9.5a.orig.tar.gz
Size/MD5 checksum: 1892089 99d22f1d4d23ff8b927f94a9df3997b4
Alpha architecture:
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_alpha.deb
Size/MD5 checksum: 497152 fe3d6854382f8dbe2d10f3f5700dd8f6
ARM architecture:
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_arm.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_arm.deb
Size/MD5 checksum: 402498 551b79fbb80903f174d6edeffd9869df
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_i386.deb
Size/MD5 checksum: 399752 2a856ac6b45d41beb0bf78880b236966
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_m68k.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_m68k.deb
Size/MD5 checksum: 376738 980e428e9b913672d939ebe77c18cd6d
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_mips.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_mips.deb
Size/MD5 checksum: 412624 b8c7cc0b4dcbf1cf03480b93c78cd610
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_mipsel.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_mipsel.deb
Size/MD5 checksum: 407388 de02385580cf33c344c1ffadcf8aed88
PowerPC architecture:
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_powerpc.deb
Size/MD5 checksum: 425452 c3d04af89c64e6e9f0175e6cd4997058
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_sparc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_sparc.deb
Size/MD5 checksum: 412196 ae1181c2873a304c583800459da53e5a
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
HP
—
http://www.debian.org/security/2003/dsa-394” target=”_blank”>
http://www.debian.org/security/2003/dsa-394
MandrakeSoft
————
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
MandrakeSoft Corporate Server 2.1 x86_64:
Mandrake Upgrade libopenssl0-0.9.6i-1.6.90mdk.x86_64.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Corporate Server 2.1/x86_64 FTP Folder: x86_64/corporate/2.1/RPMS/
Mandrake Upgrade libopenssl0-devel-0.9.6i-1.6.90mdk.x86_64.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Corporate Server 2.1/x86_64 FTP Folder: x86_64/corporate/2.1/RPMS/
Mandrake Upgrade libopenssl0-static-devel-0.9.6i-1.6.90mdk.x86_64.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Corporate Server 2.1/x86_64 FTP Folder: x86_64/corporate/2.1/RPMS/
Mandrake Upgrade openssl-0.9.6i-1.6.90mdk.x86_64.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Corporate Server 2.1/x86_64 FTP Folder: x86_64/corporate/2.1/RPMS/
MandrakeSoft Corporate Server 2.1:
Mandrake Upgrade libopenssl0-0.9.6i-1.6.90mdk.i586.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Corporate Server 2.1 FTP Folder: corporate/2.1/RPMS/
Mandrake Upgrade libopenssl0-devel-0.9.6i-1.6.90mdk.i586.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Corporate Server 2.1 FTP Folder: corporate/2.1/RPMS/
Mandrake Upgrade libopenssl0-static-devel-0.9.6i-1.6.90mdk.i586.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Corporate Server 2.1 FTP Folder: corporate/2.1/RPMS/
Mandrake Upgrade openssl-0.9.6i-1.6.90mdk.i586.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Corporate Server 2.1 FTP Folder: corporate/2.1/RPMS/
MandrakeSoft Multi Network Firewall 8.2:
Mandrake Upgrade libopenssl0-0.9.6i-1.5.82mdk.i586.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Multi Network Firewall 8.2 FTP Folder: mnf8.2/RPMS/
Mandrake Upgrade openssl-0.9.6i-1.5.82mdk.i586.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Multi Network Firewall 8.2 FTP Folder: mnf8.2/RPMS/
MandrakeSoft Linux Mandrake 8.2:
Mandrake Upgrade libopenssl0-0.9.6i-1.5.82mdk.i586.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Mandrake Linux 8.2 FTP Folder: 8.2/RPMS/
Mandrake Upgrade libopenssl0-devel-0.9.6i-1.5.82mdk.i586.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Mandrake Linux 8.2 FTP Folder: 8.2/RPMS/
Mandrake Upgrade libopenssl0-static-devel-0.9.6i-1.5.82mdk.i586.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Mandrake Linux 8.2 FTP Folder: 8.2/RPMS/
Mandrake Upgrade openssl-0.9.6i-1.5.82mdk.i586.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Mandrake Linux 8.2 FTP Folder: 8.2/RPMS/
MandrakeSoft Linux Mandrake 9.0:
Mandrake Upgrade libopenssl0-devel-0.9.6i-1.6.90mdk.i586.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Mandrake Linux 9.0 FTP Folder: 9.0/RPMS/
Mandrake Upgrade libopenssl0-static-devel-0.9.6i-1.6.90mdk.i586.rpm
http://www.mandrakesecure.net/en/ftp.php” target=”_blank”>
http://www.mandrakesecure.net/en/ftp.php
Mandrake Linux 9.0 FTP Folder: 9.0/RPMS/
Mandrake Upgrade openssl-0
参考网址
来源:US-CERT Vulnerability Note: VU#380864
名称: VU#380864
链接:http://www.kb.cert.org/vuls/id/380864
来源:CERT/CC Advisory: CA-2003-26
名称: CA-2003-26
链接:http://www.cert.org/advisories/CA-2003-26.html
来源: REDHAT
名称: RHSA-2003:292
链接:http://www.redhat.com/support/errata/RHSA-2003-292.html
来源: REDHAT
名称: RHSA-2003:291
链接:http://www.redhat.com/support/errata/RHSA-2003-291.html
来源: www.uniras.gov.uk
链接:http://www.uniras.gov.uk/vuls/2003/006489/openssl.htm
来源: ENGARDE
名称: ESA-20030930-027
链接:http://www.linuxsecurity.com/advisories/engarde_advisory-3693.html
来源: DEBIAN
名称: DSA-394
链接:http://www.debian.org/security/2003/dsa-394
来源: DEBIAN
名称: DSA-393
链接:http://www.debian.org/security/2003/dsa-393
来源: SUNALERT
名称: 201029
链接:http://sunsolve.sun.com/search/document.do?assetkey=1-66-201029-1
来源: bugzilla.redhat.com
链接:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=104893
来源: XF
名称: openssl-asn1-sslclient-dos(43041)
链接:http://xforce.iss.net/xforce/xfdb/43041
来源: BID
名称: 8732
链接:http://www.securityfocus.com/bid/8732
来源: VUPEN
名称: ADV-2006-3900
链接:http://www.frsirt.com/english/advisories/2006/3900
来源: www-1.ibm.com
链接:http://www-1.ibm.com/support/docview.wss?uid=swg21247112
来源: SECUNIA
名称: 22249
链接:http://secunia.com/advisories/22249
来源: US Government Resource: oval:org.mitre.oval:def:4574
名称: oval:org.mitre.oval:def:4574
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:4574