FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

OpenSSL -- multiple vulnerabilities

Affected packages
1.0.1 <= openssl < 1.0.1_13
1.0.1 <= mingw32-openssl < 1.0.1h
Affected systems
8.0 <= FreeBSD < 8.4_12
9.1 <= FreeBSD < 9.1_15
9.2 <= FreeBSD < 9.2_8
10.0 <= FreeBSD < 10.0_5

Details

VuXML ID 5ac53801-ec2e-11e3-9cf3-3c970e169bc2
Discovery 2014-06-05
Entry 2014-06-05

The OpenSSL Project reports:

An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. [CVE-2014-0224]

By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. [CVE-2014-0221]

A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. [CVE-2014-0195]

OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack. [CVE-2014-3470]

References

CVE Name CVE-2014-0195
CVE Name CVE-2014-0221
CVE Name CVE-2014-0224
CVE Name CVE-2014-3470
URL http://www.freebsd.org/security/advisories/FreeBSD-SA-14:14.openssl.asc
URL http://www.openssl.org/news/secadv_20140605.txt