lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030321152401.B14854@sco.com>
Date: Fri, 21 Mar 2003 15:24:01 -0800
From: security@....com
To: bugtraq@...urityfocus.com, announce@...ts.caldera.com,
	security-alerts@...uxsecurity.com
Subject: Security Update: [CSSA-2003-014.0] Linux: several recently discovered openssl vulnerabilities

To: bugtraq@...urityfocus.com announce@...ts.caldera.com security-alerts@...uxsecurity.com


______________________________________________________________________________

			SCO Security Advisory

Subject:		Linux: several recently discovered openssl vulnerabilities
Advisory number: 	CSSA-2003-014.0
Issue date: 		2003 March 21
Cross reference:
______________________________________________________________________________


1. Problem Description

	Dan Boneh and David Brumley have successfully implemented an
	RSA timing attack against openssl. This updated version guards
	against this attack. In an upcoming paper, Brice Canvel (EPFL),
	Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux
	(EPFL, Ilion) describe and demonstrate a timing-based attack on
	CBC ciphersuites in SSL and TLS.


2. Vulnerable Supported Versions

	System				Package
	----------------------------------------------------------------------

	OpenLinux 3.1.1 Server		prior to openssl-0.9.6-21.i386.rpm
					prior to openssl-devel-0.9.6-21.i386.rpm
					prior to openssl-devel-static-0.9.6-21.i386.rpm

	OpenLinux 3.1.1 Workstation	prior to openssl-0.9.6-21.i386.rpm
					prior to openssl-devel-0.9.6-21.i386.rpm
					prior to openssl-devel-static-0.9.6-21.i386.rpm

	OpenLinux 3.1 Server		prior to openssl-0.9.6-21.i386.rpm
					prior to openssl-devel-0.9.6-21.i386.rpm
					prior to openssl-devel-static-0.9.6-21.i386.rpm

	OpenLinux 3.1 Workstation	prior to openssl-0.9.6-21.i386.rpm
					prior to openssl-devel-0.9.6-21.i386.rpm
					prior to openssl-devel-static-0.9.6-21.i386.rpm


3. Solution

	The proper solution is to install the latest packages. Many
	customers find it easier to use the Caldera System Updater, called
	cupdate (or kcupdate under the KDE environment), to update these
	packages rather than downloading and installing them by hand.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2003-014.0/RPMS

	4.2 Packages

	cae226f7eb06d23837e4f253c024cc77	openssl-0.9.6-21.i386.rpm
	d80641bcdfc10fe4ada399fb17efe7fe	openssl-devel-0.9.6-21.i386.rpm
	0469172a21992665bc7b71f9c59d9139	openssl-devel-static-0.9.6-21.i386.rpm

	4.3 Installation

	rpm -Fvh openssl-0.9.6-21.i386.rpm
	rpm -Fvh openssl-devel-0.9.6-21.i386.rpm
	rpm -Fvh openssl-devel-static-0.9.6-21.i386.rpm

	4.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2003-014.0/SRPMS

	4.5 Source Packages

	d22d7c13968ba752f8907c009bafdcdd	openssl-0.9.6-21.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2003-014.0/RPMS

	5.2 Packages

	83d5c8c6a3c02d5b7a4efd81fdb81327	openssl-0.9.6-21.i386.rpm
	f8d72833634db5b626e4545ae9eea2b7	openssl-devel-0.9.6-21.i386.rpm
	ebba78193c80631b38df0fdd21ce996a	openssl-devel-static-0.9.6-21.i386.rpm

	5.3 Installation

	rpm -Fvh openssl-0.9.6-21.i386.rpm
	rpm -Fvh openssl-devel-0.9.6-21.i386.rpm
	rpm -Fvh openssl-devel-static-0.9.6-21.i386.rpm

	5.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2003-014.0/SRPMS

	5.5 Source Packages

	429d59854d06b6028b0e8b0006fee9c2	openssl-0.9.6-21.src.rpm


6. OpenLinux 3.1 Server

	6.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2003-014.0/RPMS

	6.2 Packages

	ceaa6676fce906d6b047111c9498e30e	openssl-0.9.6-21.i386.rpm
	3df76d418a9597160366b87931a03e15	openssl-devel-0.9.6-21.i386.rpm
	5ec798cfc52cf738f162bbe3399b143d	openssl-devel-static-0.9.6-21.i386.rpm

	6.3 Installation

	rpm -Fvh openssl-0.9.6-21.i386.rpm
	rpm -Fvh openssl-devel-0.9.6-21.i386.rpm
	rpm -Fvh openssl-devel-static-0.9.6-21.i386.rpm

	6.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2003-014.0/SRPMS

	6.5 Source Packages

	b769a799583f9f132bfd6dd41397cbe8	openssl-0.9.6-21.src.rpm


7. OpenLinux 3.1 Workstation

	7.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2003-014.0/RPMS

	7.2 Packages

	ce4782d57da7146f0351c443d3919a4a	openssl-0.9.6-21.i386.rpm
	1e979a4a13c91593130d521f3aa7da24	openssl-devel-0.9.6-21.i386.rpm
	fcf784370792245c1ec0423322482561	openssl-devel-static-0.9.6-21.i386.rpm

	7.3 Installation

	rpm -Fvh openssl-0.9.6-21.i386.rpm
	rpm -Fvh openssl-devel-0.9.6-21.i386.rpm
	rpm -Fvh openssl-devel-static-0.9.6-21.i386.rpm

	7.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2003-014.0/SRPMS

	7.5 Source Packages

	9cab4a8e60af1089f35893c758d00ebc	openssl-0.9.6-21.src.rpm


8. References

	Specific references for this advisory:

		http://crypto.stanford.edu/~dabo/abstracts/ssl-timing.html
		http://www.openssl.org/news/secadv_20030219.txt
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0078
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0131
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0147

	SCO security resources:

		http://www.sco.com/support/security/index.html

	This security fix closes SCO incidents sr875560, fz527505,
	erg712255.


9. Disclaimer

	SCO is not responsible for the misuse of any of the information
	we provide on this website and/or through our security
	advisories. Our advisories are a service to our customers intended
	to promote secure installation and use of SCO products.

______________________________________________________________________________

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ