openSSL back again! Seven (7) CVE on this one! PDF Print E-mail
User Rating: / 0
Written by Michael Felt   
IBM SECURITY ADVISORY (#12 for openssl!)
First Issued: Wed Feb  4 06:24:41 CST 2015
The most recent version of this document is available here:


1. CVE-2014-3570

OpenSSL does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors

2. CVE-2014-3571

OpenSSL allows remote attackers to cause a denial of service via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body

3. CVE-2014-3572

OpenSSL allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger loss of forward secrecy by omitting the ServerKeyExchange message.

4. CVE-2014-8275

OpenSSL does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion

5. CVE-2015-0204

OpenSSL allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role.

6. CVE-2015-0205

OpenSSL accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.

7. CVE-2015-0206

OpenSSL could allow remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
< Prev   Next >