Bug 908029 - (CVE-2012-2686) CVE-2012-2686 openssl: DoS due to improper handling of CBC ciphersuites in TLS 1.1/1.2 on AES-NI supporting platforms
CVE-2012-2686 openssl: DoS due to improper handling of CBC ciphersuites in TL...
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 908032
  Show dependency treegraph
Reported: 2013-02-05 12:09 EST by Vincent Danen
Modified: 2013-12-18 19:36 EST (History)
1 user (show)

See Also:
Fixed In Version: openssl 1.0.1d
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2013-12-18 19:36:23 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2013-02-05 12:09:54 EST
A flaw in the OpenSSL handling of CBC ciphersuites in TLS 1.1 and TLS 1.2 on AES-NI (Advanced Encryption Standard New Instructions) supporting platforms [1] can be exploited in a DoS attack.

Anyone using an AES-NI platform for TLS 1.2 or TLS 1.1 on OpenSSL 1.0.1c is affected. Platforms which do not support AES-NI or versions of OpenSSL which do not implement TLS 1.2 or 1.1 (for example OpenSSL 0.9.8 and 1.0.0) are not affected.

[1] http://en.wikipedia.org/wiki/AES-NI#Supporting_CPUs

External References:

Comment 1 Vincent Danen 2013-02-05 12:14:08 EST

Not vulnerable. This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 5 and 6 as they did not include support for TLS 1.2 or 1.1.
Comment 2 Vincent Danen 2013-02-05 12:14:52 EST
Created openssl tracking bugs for this issue

Affects: fedora-18 [bug 908032]
Comment 3 Tomas Hoger 2013-02-06 08:28:13 EST
Fix for this is included as part of the changeset which is one of the several changesets added to address CVE-2013-0169 in OpenSSL (bug 907589):


Note You need to log in before you can comment on or make changes to this bug.