FreeBSD Security Advisory



II. Problem Description

Several problems have been found in OpenSSL:

1. During the parsing of certain invalid ASN1 structures an error condition is mishandled, possibly resulting in an infinite loop. [CVE-2006-2937]

2. A buffer overflow exists in the SSL_get_shared_ciphers function. [CVE-2006-3738]

3. A NULL pointer may be dereferenced in the SSL version 2 client code. [CVE-2006-4343]

In addition, many applications using OpenSSL do not perform any validation of the lengths of public keys being used. [CVE-2006-2940]

III. Impact

Servers which parse ASN1 data from untrusted sources may be vulnerable to a denial of service attack. [CVE-2006-2937]

An attacker accessing a server which uses SSL version 2 may be able to execute arbitrary code with the privileges of that server. [CVE-2006-3738]

A malicious SSL server can cause clients connecting using SSL version 2 to crash. [CVE-2006-4343]

Applications which perform public key operations using untrusted keys may be vulnerable to a denial of service attack. [CVE-2006-2940]

Technorati Tags: , ,

No Responses Yet to “FreeBSD Security Advisory”

  1. 發表迴響


在下方填入你的資料或按右方圖示以社群網站登入: 標誌

您的留言將使用 帳號。 登出 /  變更 )

Google photo

您的留言將使用 Google 帳號。 登出 /  變更 )

Twitter picture

您的留言將使用 Twitter 帳號。 登出 /  變更 )


您的留言將使用 Facebook 帳號。 登出 /  變更 )

連結到 %s

%d 位部落客按了讚: