Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  


Synopsis:          Updated OpenSSL packages fix timing attack
Advisory ID:       RHSA-2003:063-08
Issue date:        2003-02-19
Updated on:        2003-03-10
Product:           Red Hat Advanced Products
Keywords:=20=20=20=20=20=20=20=20=20=20
Cross references:=20=20
Obsoletes:         RHSA-2002:161
CVE Names:         CAN-2003-0078
---------------------------------------------------------------------

1. Topic:

Updated OpenSSL packages are available that fix a potential timing-based
attack.

2. Relevant releases/architectures:

Red Hat Linux Advanced Server 2.1 - i386, i686, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64

3. Problem description:

OpenSSL is a commercial-grade, full-featured, and open source toolkit which
implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer
Security (TLS v1) protocols as well as a full-strength, general purpose
cryptography library.

In a paper, Brice Canvel, Alain Hiltgen, Serge Vaudenay, and Martin
Vuagnoux describe and demonstrate a timing-based attack on CBC ciphersuites
in SSL and TLS.  An active attacker may be able to use timing observations
to distinguish between two different error cases: cipher padding errors and
MAC verification errors.  Over multiple connections this can leak
sufficient information to be able to retrieve the plaintext of a common,
fixed block.

In order for an attack to be sucessful an attacker must be able to act as a
man-in-the-middle to intercept and modify multiple connections which all
involve a common fixed plaintext block (such as a password), and have good
network conditions that allow small changes in timing to be reliably observ=
ed.

These updated packages contain a patch provided by the OpenSSL group that
corrects this vulnerability.

Because server applications are affected by these vulnerabilities, we
advise users to restart all services that use OpenSSL functionality or
alternatively reboot their systems after installing these updates.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Please note that this update is available via Red Hat Network.  To use Red
Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

84597 - OpenSSL CBC timing attack

6. RPMs required:

Red Hat Linux Advanced Server 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/openssl095a-0.9.5a-18=
.7.src.rpm
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/openssl096-0.9.6-13.7=
.src.rpm
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/openssl-0.9.6b-30.7.s=
rc.rpm

i386:
Available from Red Hat Network: openssl095a-0.9.5a-18.7.i386.rpm
Available from Red Hat Network: openssl096-0.9.6-13.7.i386.rpm
Available from Red Hat Network: openssl-0.9.6b-30.7.i386.rpm
Available from Red Hat Network: openssl-devel-0.9.6b-30.7.i386.rpm
Available from Red Hat Network: openssl-perl-0.9.6b-30.7.i386.rpm

i686:
Available from Red Hat Network: openssl-0.9.6b-30.7.i686.rpm

ia64:
Available from Red Hat Network: openssl095a-0.9.5a-18.7.ia64.rpm
Available from Red Hat Network: openssl096-0.9.6-13.7.ia64.rpm
Available from Red Hat Network: openssl-0.9.6b-30.7.ia64.rpm
Available from Red Hat Network: openssl-devel-0.9.6b-30.7.ia64.rpm
Available from Red Hat Network: openssl-perl-0.9.6b-30.7.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/openssl095a-0.9.5a-18=
.7.src.rpm
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/openssl096-0.9.6-13.7=
.src.rpm
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/openssl-0.9.6b-30.7.s=
rc.rpm

ia64:
Available from Red Hat Network: openssl095a-0.9.5a-18.7.ia64.rpm
Available from Red Hat Network: openssl096-0.9.6-13.7.ia64.rpm
Available from Red Hat Network: openssl-0.9.6b-30.7.ia64.rpm
Available from Red Hat Network: openssl-devel-0.9.6b-30.7.ia64.rpm
Available from Red Hat Network: openssl-perl-0.9.6b-30.7.ia64.rpm



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
3ae2cc393a411ce6d4bf02ca2902c3b3 2.1AS/en/os/SRPMS/openssl-0.9.6b-30.7.src.=
rpm
4eeca68ad45a889cf99e9888244f811f 2.1AS/en/os/SRPMS/openssl095a-0.9.5a-18.7.=
src.rpm
f6e69835cf22aaf4ed81182d3b3238f2 2.1AS/en/os/SRPMS/openssl096-0.9.6-13.7.sr=
c.rpm
561ca4b931f7aa1b5e5b187eadc50979 2.1AS/en/os/i386/openssl-0.9.6b-30.7.i386.=
rpm
b800915ee28c2ee3e16f0efd3a982cfd 2.1AS/en/os/i386/openssl-devel-0.9.6b-30.7=
.i386.rpm
61343012eef3bbe98c0d84a507d42139 2.1AS/en/os/i386/openssl-perl-0.9.6b-30.7.=
i386.rpm
0c8458c5fe99f2dccbd99fc1471e579d 2.1AS/en/os/i386/openssl095a-0.9.5a-18.7.i=
386.rpm
f1f521a9af06532b0ca4cbadf191f9f6 2.1AS/en/os/i386/openssl096-0.9.6-13.7.i38=
6.rpm
90238359f766d40a6fea1ce187378e0f 2.1AS/en/os/i686/openssl-0.9.6b-30.7.i686.=
rpm
d04117405d4d98952b45482b540adc48 2.1AS/en/os/ia64/openssl-0.9.6b-30.7.ia64.=
rpm
835873daf75483628c41030b2d3bf416 2.1AS/en/os/ia64/openssl-devel-0.9.6b-30.7=
.ia64.rpm
4bfc8f05437a13ceb5fbcad25e7a4a50 2.1AS/en/os/ia64/openssl-perl-0.9.6b-30.7.=
ia64.rpm
6405dbbcc5bb5bf240b4623456b4d6ab 2.1AS/en/os/ia64/openssl095a-0.9.5a-18.7.i=
a64.rpm
cca8bf123ae09e0c73b9a817b441af1b 2.1AS/en/os/ia64/openssl096-0.9.6-13.7.ia6=
4.rpm
3ae2cc393a411ce6d4bf02ca2902c3b3 2.1AW/en/os/SRPMS/openssl-0.9.6b-30.7.src.=
rpm
4eeca68ad45a889cf99e9888244f811f 2.1AW/en/os/SRPMS/openssl095a-0.9.5a-18.7.=
src.rpm
f6e69835cf22aaf4ed81182d3b3238f2 2.1AW/en/os/SRPMS/openssl096-0.9.6-13.7.sr=
c.rpm
d04117405d4d98952b45482b540adc48 2.1AW/en/os/ia64/openssl-0.9.6b-30.7.ia64.=
rpm
835873daf75483628c41030b2d3bf416 2.1AW/en/os/ia64/openssl-devel-0.9.6b-30.7=
.ia64.rpm
4bfc8f05437a13ceb5fbcad25e7a4a50 2.1AW/en/os/ia64/openssl-perl-0.9.6b-30.7.=
ia64.rpm
6405dbbcc5bb5bf240b4623456b4d6ab 2.1AW/en/os/ia64/openssl095a-0.9.5a-18.7.i=
a64.rpm
cca8bf123ae09e0c73b9a817b441af1b 2.1AW/en/os/ia64/openssl096-0.9.6-13.7.ia6=
4.rpm


These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
=20=20=20=20
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
=20=20=20=20
    md5sum <filename>


8. References:

http://lasecwww.epfl.ch/pub/lasec/doc/Vau02a.ps
http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2003-0078

9. Contact:

The Red Hat security contact is <security@redhat.com>.  More contact
details at http://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.






© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.