OpenSSL ASN.1多个解析安全漏洞

admin 2022-07-22 11:29:01 CNNVD漏洞 来源:ZONE.CI 全球网 0 阅读模式

漏洞信息详情

OpenSSL ASN.1多个解析安全漏洞

  • CNNVD编号:CNNVD-200311-033
  • 危害等级: 高危
  • CVE编号: CVE-2003-0545
  • 漏洞类型: 缓冲区溢出
  • 发布时间: 2003-09-30
  • 威胁类型: 远程
  • 更新时间: 2005-10-20
  • 厂        商: openssl
  • 漏洞来源: NISCC uniras@niscc...

漏洞简介

OpenSSL是OpenSSL团队开发的一个开源的能够实现安全套接层(SSL v2/v3)和安全传输层(TLS v1)协议的通用加密库,它支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL中的ASN.1解析代码存在多个问题,远程攻击者可以利用这个漏洞对系统进行拒绝服务攻击或执行任意代码。 漏洞问题如下: 1、部分ASN.1编码被解析器会由于非法而拒绝,当处理对应的数据结构时会触发错误而破坏堆栈,这可用于远程拒绝服务。目前还不清楚是否可用于执行任意代码。此漏洞不影响OpenSSL 0.9.6版本。 2、不正确ASN.1标记值可在部分条件下引起读取非法边界值(整数溢出问题),可导致拒绝服务漏洞。 3、如果设置成忽略公钥解码错误,证书中包含畸形公钥会引起服务崩溃。公钥解码错误一般不忽略(除非在调试情况下)。目前还不清楚是否可利用执行任意代码。 4、由于在SSL/TLS协议处理上存在错误,当没有指定请求时服务器也会解析客户端证书。这严格的来说不是一个漏洞,但是这意味着使用OpenSSL的SSL/TLS服务器可使用漏洞1,2,3进行攻击,即使没有启用客户端验证的情况下。

漏洞公告

厂商补丁: Debian ------ Debian已经为此发布了一个安全公告(DSA-394-1)以及相应补丁:

DSA-394-1:New openssl095 packages fix denial of service

链接: http://www.debian.org/security/2002/dsa-394

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/o/openssl095/openssl095_0.9.5a-6.woody.3.dsc

Size/MD5 checksum: 631 ba6e597ab2db2984aef6c2a765ac29c0

http://security.debian.org/pool/updates/main/o/openssl095/openssl095_0.9.5a-6.woody.3.diff.gz

Size/MD5 checksum: 38851 6b197111a7068a7ea29ef55176771d89

http://security.debian.org/pool/updates/main/o/openssl095/openssl095_0.9.5a.orig.tar.gz

Size/MD5 checksum: 1892089 99d22f1d4d23ff8b927f94a9df3997b4

Alpha architecture:

http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_alpha.deb

Size/MD5 checksum: 497152 fe3d6854382f8dbe2d10f3f5700dd8f6

ARM architecture:

http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_arm.deb

Size/MD5 checksum: 402498 551b79fbb80903f174d6edeffd9869df

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_i386.deb

Size/MD5 checksum: 399752 2a856ac6b45d41beb0bf78880b236966

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_m68k.deb

Size/MD5 checksum: 376738 980e428e9b913672d939ebe77c18cd6d

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_mips.deb

Size/MD5 checksum: 412624 b8c7cc0b4dcbf1cf03480b93c78cd610

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_mipsel.deb

Size/MD5 checksum: 407388 de02385580cf33c344c1ffadcf8aed88

PowerPC architecture:

http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_powerpc.deb

Size/MD5 checksum: 425452 c3d04af89c64e6e9f0175e6cd4997058

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/o/openssl095/libssl095a_0.9.5a-6.woody.3_sparc.deb

Size/MD5 checksum: 412196 ae1181c2873a304c583800459da53e5a

补丁安装方法:

1. 手工安装补丁包:

首先,使用下面的命令来下载补丁软件:

# wget url (url是补丁下载链接地址)

然后,使用下面的命令来安装补丁:

# dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

首先,使用下面的命令更新内部数据库:

# apt-get update

然后,使用下面的命令安装更新软件包:

# apt-get upgrade HP -- http://www.debian.org/security/2003/dsa-394 MandrakeSoft ------------ 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

MandrakeSoft Corporate Server 2.1 x86_64:

Mandrake Upgrade libopenssl0-0.9.6i-1.6.90mdk.x86_64.rpm

http://www.mandrakesecure.net/en/ftp.php

Corporate Server 2.1/x86_64 FTP Folder: x86_64/corporate/2.1/RPMS/

Mandrake Upgrade libopenssl0-devel-0.9.6i-1.6.90mdk.x86_64.rpm

http://www.mandrakesecure.net/en/ftp.php

Corporate Server 2.1/x86_64 FTP Folder: x86_64/corporate/2.1/RPMS/

Mandrake Upgrade libopenssl0-static-devel-0.9.6i-1.6.90mdk.x86_64.rpm

http://www.mandrakesecure.net/en/ftp.php

Corporate Server 2.1/x86_64 FTP Folder: x86_64/corporate/2.1/RPMS/

Mandrake Upgrade openssl-0.9.6i-1.6.90mdk.x86_64.rpm

http://www.mandrakesecure.net/en/ftp.php

Corporate Server 2.1/x86_64 FTP Folder: x86_64/corporate/2.1/RPMS/

MandrakeSoft Corporate Server 2.1:

Mandrake Upgrade libopenssl0-0.9.6i-1.6.90mdk.i586.rpm

http://www.mandrakesecure.net/en/ftp.php

Corporate Server 2.1 FTP Folder: corporate/2.1/RPMS/

Mandrake Upgrade libopenssl0-devel-0.9.6i-1.6.90mdk.i586.rpm

http://www.mandrakesecure.net/en/ftp.php

Corporate Server 2.1 FTP Folder: corporate/2.1/RPMS/

Mandrake Upgrade libopenssl0-static-devel-0.9.6i-1.6.90mdk.i586.rpm

http://www.mandrakesecure.net/en/ftp.php

Corporate Server 2.1 FTP Folder: corporate/2.1/RPMS/

Mandrake Upgrade openssl-0.9.6i-1.6.90mdk.i586.rpm

http://www.mandrakesecure.net/en/ftp.php

Corporate Server 2.1 FTP Folder: corporate/2.1/RPMS/

MandrakeSoft Multi Network Firewall 8.2:

Mandrake Upgrade libopenssl0-0.9.6i-1.5.82mdk.i586.rpm

http://www.mandrakesecure.net/en/ftp.php

Multi Network Firewall 8.2 FTP Folder: mnf8.2/RPMS/

Mandrake Upgrade openssl-0.9.6i-1.5.82mdk.i586.rpm

http://www.mandrakesecure.net/en/ftp.php

Multi Network Firewall 8.2 FTP Folder: mnf8.2/RPMS/

MandrakeSoft Linux Mandrake 8.2:

Mandrake Upgrade libopenssl0-0.9.6i-1.5.82mdk.i586.rpm

http://www.mandrakesecure.net/en/ftp.php

Mandrake Linux 8.2 FTP Folder: 8.2/RPMS/

Mandrake Upgrade libopenssl0-devel-0.9.6i-1.5.82mdk.i586.rpm

http://www.mandrakesecure.net/en/ftp.php

Mandrake Linux 8.2 FTP Folder: 8.2/RPMS/

Mandrake Upgrade libopenssl0-static-devel-0.9.6i-1.5.82mdk.i586.rpm

http://www.mandrakesecure.net/en/ftp.php

Mandrake Linux 8.2 FTP Folder: 8.2/RPMS/

Mandrake Upgrade openssl-0.9.6i-1.5.82mdk.i586.rpm

http://www.mandrakesecure.net/en/ftp.php

Mandrake Linux 8.2 FTP Folder: 8.2/RPMS/

MandrakeSoft Linux Mandrake 9.0:

Mandrake Upgrade libopenssl0-devel-0.9.6i-1.6.90mdk.i586.rpm

http://www.mandrakesecure.net/en/ftp.php

Mandrake Linux 9.0 FTP Folder: 9.0/RPMS/

Mandrake Upgrade libopenssl0-static-devel-0.9.6i-1.6.90mdk.i586.rpm

http://www.mandrakesecure.net/en/ftp.php

Mandrake Linux 9.0 FTP Folder: 9.0/RPMS/

Mandrake Upgrade openssl-0

参考网址

来源:US-CERT Vulnerability Note: VU#935264 名称: VU#935264 链接:http://www.kb.cert.org/vuls/id/935264 来源:CERT/CC Advisory: CA-2003-26 名称: CA-2003-26 链接:http://www.cert.org/advisories/CA-2003-26.HTML 来源: REDHAT 名称: RHSA-2003:292 链接:http://www.redhat.com/support/errata/RHSA-2003-292.HTML 来源: BID 名称: 8732 链接:http://www.securityfocus.com/bid/8732 来源: VUPEN 名称: ADV-2006-3900 链接:http://www.frsirt.com/english/advisories/2006/3900 来源: DEBIAN 名称: DSA-394 链接:http://www.debian.org/security/2003/dsa-394 来源: www-1.ibm.com 链接:http://www-1.ibm.com/support/docview.wss?uid=swg21247112 来源: SECUNIA 名称: 22249 链接:http://secunia.com/advisories/22249 来源: US Government Resource: oval:org.mitre.oval:def:2590 名称: oval:org.mitre.oval:def:2590 链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:2590

受影响实体

  • Openssl Openssl:0.9.7  
  • Openssl Openssl:0.9.6  

补丁

    暂无

weinxin
特别声明
本站(ZONE.CI)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
评论:0   参与:  0