Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 771782 - (CVE-2012-0027) CVE-2012-0027 openssl: invalid GOST parameters DoS attack
CVE-2012-0027 openssl: invalid GOST parameters DoS attack
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20120104,repor...
: Security
Depends On:
Blocks: 771783
  Show dependency treegraph
 
Reported: 2012-01-04 17:58 EST by Vincent Danen
Modified: 2012-12-17 12:58 EST (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-01-05 04:20:15 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2012-01-04 17:58:53 EST
Invalid GOST parameters DoS Attack (CVE-2012-0027)
===================================================

A malicious TLS client can send an invalid set of GOST parameters
which will cause the server to crash due to lack of error checking.
This could be used in a denial-of-service attack.

Only users of the OpenSSL GOST ENGINE are affected by this bug.

Thanks to Andrey Kulikov <amdeich@gmail.com> for identifying and fixing
this issue.

Affected users should upgrade to OpenSSL 1.0.0f.

Reference: http://openssl.org/news/secadv_20120104.txt
Comment 1 Vincent Danen 2012-01-04 18:07:07 EST
Seems to be the fix here:

http://cvs.openssl.org/chngview?cn=21957
Comment 2 Tomas Mraz 2012-01-05 03:54:03 EST
GOST Engine is not being compiled on Fedora and RHEL due to requirement of EC crypto.
Comment 3 Tomas Hoger 2012-01-05 04:18:39 EST
Additionally, openssl versions in Red Hat Enterprise Linux 5 and earlier do not include GOST at all.
Comment 4 Tomas Hoger 2012-01-05 04:20:15 EST
Statement:

Not vulnerable. This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 3, 4, 5 and 6, as they did not include GOST engine support.

Note You need to log in before you can comment on or make changes to this bug.