Six OpenSSL holes plugged

By
Follow google news

Padding Oracle Attack squashed.

OpenSSL has fixed vulnerabilities in its implementation of the Datagram Transport Layer Security (DTLS) protocol that allowed secure communications to be decrypted.

Six OpenSSL holes plugged

The fix was one of six others contained in the latest versions of the OpenSSL library released this week.

The DTLS hole, detailed (pdf) by Kenny Paterson and Nadhem Alfardan under the 'Padding Oracle Attack'  allowed an attacker to view encrypted data in plain text.

Timing differences in the cipher-block chaining process allowed dependenices between blocks of ciphertext to be overcome.

Other fixed vulnerabilities include three denial of service bugs, a double-free, and an Uninitialized SSL 3.0 Padding flaw.

The latter flaw was limited in scope and meant that in each record up to 15 bytes of uninitialized memory could be sent, encrypted, to SSL peers.

It arose because OpenSSL failed to clear the bytes used as block cipher padding in SSL 3.0 records. It did not affect TLS.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:

Most Read Articles

Microsoft releases fix for flawed January security update

Microsoft releases fix for flawed January security update

Microsoft patches single-click Copilot data stealing attack

Microsoft patches single-click Copilot data stealing attack

WhatsApp unveils high-security mode

WhatsApp unveils high-security mode

Fix out for remotely exploited Cisco enterprise UC suite bug

Fix out for remotely exploited Cisco enterprise UC suite bug

Log In

  |  Forgot your password?