Dr S N Henson of the OpenSSL core team and Open Network Security recently developed an ASN1 test suite for NISCC (www.niscc.gov.uk). When the test suite was run against OpenSSL a denial of service vulnerability was discovered. During the parsing of certain invalid ASN1 structures an error condition is mishandled. This can result in an infinite loop which consumes system memory. CVE-2006-2938 Any code which uses OpenSSL to parse ASN1 data from untrusted sources is affected. This includes SSL servers which enable client authentication and S/MIME applications. This issue affects 0.9.7 and 0.9.8 but not 0.9.6 and earlier Embargo until 20060928
Created attachment 136729 [details] proposed patch CVE-2006-2937
removing embargo, public at http://www.openssl.org/news/secadv_20060928.txt
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2006-0695.html