OpenSSL memory corruption vulnerability in the ASN.1 encoder
A vulnerability in the ASN.1 encoder used by OpenSSL has recently been discovered. OpenSSL is an open-source implementation of the SSL and TLS protocols used by a number of applications and products. SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are protocols which ensure secure communication over the Internet via encryption. One of the high severity vulnerabilities discovered (CVE-2016-2108), if successfully exploited, could result in code execution. This could lead to an attacker gaining elevated privileges, stealing sensitive information or bypassing security restrictions. Failed exploitation attempts may result in denial-of-service conditions which would impact the availability of the web server.
CVE-2016-2018 is a memory corruption vulnerability in the ASN.1 encoder which has the potential to crash a program or service as well as the potential to cause the program or service to exhibit strange or erratic behavior.
CVE-2016-2108 specifically allows the potential for an attacker to perform an out-of-bounds write. This writes data outside of the intended buffer zone. The broad impact capabilities of an out-of-bounds write could allow a denial-of-service by causing an application crash or in some cases, remote code execution.
Additional Information can be found at:
- OpenSSL 1.0.2 users should upgrade to 1.0.2c
- OpenSSL 1.0.1 users should upgrade to 1.0.1o
Applications that parse and re-encode X509 certificates using the OpenSSL library are known to be vulnerable, additionally applications that verify RSA signatures on X509 certificates may also be vulnerable.
- 1.0.1n, 1.0.1m, 1.0.1l, 1.0.1k
- 1.0.1j, 1.0.1i, 1.0.1h, 1.0.1g
- 1.0.1f, 1.0.1e, 1.0.1d, 1.0.1c
- 1.0.1b, 1.0.1a, 1.0.1
- 1.0.2b, 1.0.2a, 1.0.2