Bug 1103593 (CVE-2014-0221) - CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake
Summary: CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-0221
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1096233 1096234 1103604 1103605 1103632 1103633 1103741 1104349 1104350 1104970 1104988 1127831 1127832 1127888 1127889
Blocks: 1064757 1103601 1116304 1127468
TreeView+ depends on / blocked
 
Reported: 2014-06-02 07:25 UTC by Huzaifa S. Sidhpurwala
Modified: 2021-02-17 06:31 UTC (History)
50 users (show)

Fixed In Version: openssl 1.0.1h, openssl 1.0.0m, openssl 0.9.8za
Doc Type: Bug Fix
Doc Text:
A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. A specially crafted DTLS handshake packet could cause a DTLS client using OpenSSL to crash.
Clone Of:
Environment:
Last Closed: 2014-08-14 10:54:29 UTC


Attachments (Terms of Use)
Upstream patch (1.04 KB, patch)
2014-06-02 08:30 UTC, Huzaifa S. Sidhpurwala
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0625 0 normal SHIPPED_LIVE Important: openssl security update 2014-06-05 15:50:21 UTC
Red Hat Product Errata RHSA-2014:0628 0 normal SHIPPED_LIVE Important: openssl security update 2014-06-05 16:12:30 UTC
Red Hat Product Errata RHSA-2014:0679 0 normal SHIPPED_LIVE Important: openssl security update 2014-06-10 16:23:51 UTC
Red Hat Product Errata RHSA-2014:1021 0 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 6.3.0 update 2014-08-06 18:52:25 UTC
Red Hat Product Errata RHSA-2014:1053 0 normal SHIPPED_LIVE Moderate: openssl security update 2014-08-13 22:18:41 UTC
Red Hat Product Errata RHSA-2014:1086 0 normal SHIPPED_LIVE Important: Red Hat JBoss Web Server 2.1.0 update 2014-08-21 19:30:27 UTC

Description Huzaifa S. Sidhpurwala 2014-06-02 07:25:42 UTC
As per the upstream advisory:

By sending an invalid DTLS handshake to an OpenSSL DTLS client, the code can be made to recurse, eventually crashing in a DoS attack.

Only applications using OpenSSL as a DTLS client are affected.

OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za
OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m.
OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h.
.

Acknowledgements:

Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Imre Rad of Search-Lab as the original reporter of this issue.

Comment 2 Huzaifa S. Sidhpurwala 2014-06-02 08:30:49 UTC
Created attachment 901374 [details]
Upstream patch

Comment 8 Huzaifa S. Sidhpurwala 2014-06-04 08:51:33 UTC
Statement:

(none)

Comment 10 Huzaifa S. Sidhpurwala 2014-06-05 11:32:26 UTC
Fixed upstream in OpenSSL 1.0.1h, 1.0.0m and 0.9.8za.

External References:

https://www.openssl.org/news/secadv_20140605.txt

Comment 12 errata-xmlrpc 2014-06-05 11:54:11 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:0625 https://rhn.redhat.com/errata/RHSA-2014-0625.html

Comment 13 Huzaifa S. Sidhpurwala 2014-06-05 12:13:32 UTC
Created openssl tracking bugs for this issue:

Affects: fedora-all [bug 1096233]

Comment 14 Huzaifa S. Sidhpurwala 2014-06-05 12:13:38 UTC
Created mingw-openssl tracking bugs for this issue:

Affects: fedora-all [bug 1096234]

Comment 15 errata-xmlrpc 2014-06-05 12:16:01 UTC
This issue has been addressed in following products:

  Red Hat Storage 2.1

Via RHSA-2014:0628 https://rhn.redhat.com/errata/RHSA-2014-0628.html

Comment 16 Fedora Update System 2014-06-05 21:53:57 UTC
openssl-1.0.1e-38.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 17 Fedora Update System 2014-06-05 21:54:53 UTC
openssl-1.0.1e-38.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 18 errata-xmlrpc 2014-06-10 12:28:22 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 7

Via RHSA-2014:0679 https://rhn.redhat.com/errata/RHSA-2014-0679.html

Comment 19 Prabhakar Pujeri 2014-06-11 07:44:32 UTC
is there Errata for RHEL 5.9 ?

Comment 20 Tomas Hoger 2014-06-11 08:27:41 UTC
(In reply to Prabhakar Pujeri from comment #19)
> is there Errata for RHEL 5.9 ?

Please direct this question to Red Hat Support:
https://access.redhat.com/site/support

Comment 23 Martin Prpič 2014-08-06 08:02:27 UTC
IssueDescription:

A denial of service flaw was found in the way OpenSSL handled certain DTLS ServerHello requests. A specially crafted DTLS handshake packet could cause a DTLS client using OpenSSL to crash.

Comment 28 errata-xmlrpc 2014-08-06 14:53:02 UTC
This issue has been addressed in following products:

  JBoss Enterprise Application Platform 6.3.0

Via RHSA-2014:1021 https://rhn.redhat.com/errata/RHSA-2014-1021.html

Comment 30 Tomas Hoger 2014-08-07 18:39:07 UTC
Created mingw32-openssl tracking bugs for this issue:

Affects: epel-5 [bug 1127888]

Comment 31 errata-xmlrpc 2014-08-13 18:19:00 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2014:1053 https://rhn.redhat.com/errata/RHSA-2014-1053.html

Comment 32 errata-xmlrpc 2014-08-21 15:32:37 UTC
This issue has been addressed in following products:

  JBoss Web Server 2.1.0

Via RHSA-2014:1086 https://rhn.redhat.com/errata/RHSA-2014-1086.html


Note You need to log in before you can comment on or make changes to this bug.