It was discovered that OpenSSL did not properly handle TLS record length values from the received TLS packets. After subtracting the number of padding bytes from the record length value, it did not check the resulting record length before subtracting the size of explicit IV (initialization vector for CBC encryption modes). This could result in an integer underflow of the record length value, leading to a buffer over-read and out-of-bounds access. A remote TLS peer could use this to crash an application using OpenSSL (usually a TLS or DTLS server) by sending a specially TLS packet. Explicit IV is used in TLS 1.2, 1.1 and DTLS. The openssl packages in Red Hat Enterprise Linux 3, 4, 5, and 6 only support TLS 1.0 and do not support TLS 1.1 and 1.2 and hence are not affected by the TLS part of this problem. TLS versions 1.1 and 1.2 support was introduced upstream in OpenSSL version 1.0.1. That version is currently only available in Fedora Rawhide/18. The support for DTLS (Datagram Transport Layer Security) is enabled in openssl packages in Red Hat Enterprise Linux 5 and 6 and those versions are affected by the DTLS part of this problem. Applications using openssl packages in Red Hat Enterprise Linux 5 and 6 to provide TLS/SSL service (such as httpd) are not affected by this issue. Upstream fix: http://cvs.openssl.org/chngview?cn=22538 (0.9.8) http://cvs.openssl.org/chngview?cn=22547 (1.0.1) This was fixed upstream in versions: 0.9.8x, 1.0.0j and 1.0.1c Acknowledgement: Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Codenomicon as the original reporter.
External Reference: http://openssl.org/news/secadv_20120510.txt
Created mingw32-openssl tracking bugs for this issue Affects: fedora-all [bug 820694]
Created openssl tracking bugs for this issue Affects: fedora-all [bug 820693]
CERT-FI advisory: http://www.cert.fi/en/reports/2012/vulnerability641549.html
The statement: Explicit IV is used in TLS 1.2, 1.1 and DTLS. The openssl packages in Red Hat Enterprise Linux 3, 4, 5, and 6 only support TLS 1.0 and do not support TLS 1.1 and 1.2 and hence are not affected by the TLS part of this problem. TLS versions 1.1 and 1.2 support was introduced upstream in OpenSSL version 1.0.1. That version is currently only available in Fedora Rawhide/18. Could someone update https://access.redhat.com/security/cve/CVE-2012-2333 with this information.
openssl-1.0.0j-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2012:0699 https://rhn.redhat.com/errata/RHSA-2012-0699.html
openssl-1.0.0j-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
openssl-1.0.0j-1.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.
Statement: This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 3 and 4. The openssl versions in Red Hat Enterprise Linux 5 and 6 were partially affected, as they support DTLS, but they do not support TLS 1.1 and TLS 1.2. This issue was addressed in Red Hat Enterprise Linux 5 and 6 via RHSA-2012:0699.
This issue has been addressed in following products: JBoss Enterprise Application Platform 6.0.0 Via RHSA-2012:1308 https://rhn.redhat.com/errata/RHSA-2012-1308.html
This issue has been addressed in following products: JBoss Enterprise Application Platform 5.1.2 Via RHSA-2012:1307 https://rhn.redhat.com/errata/RHSA-2012-1307.html
This issue has been addressed in following products: JBoss Enterprise Web Server 1.0.2 Via RHSA-2012:1306 https://rhn.redhat.com/errata/RHSA-2012-1306.html