iTnews

OpenSSL fixes high-severity key recovery hole

By Juha Saarinen, iTnews on Jan 29, 2016 9:25AM
OpenSSL fixes high-severity key recovery hole

Further hardening against "Logjam" attack included in update.

Developers of the popular OpenSSL cryptographic library have closed a vulnerability that could potentially allow attackers to steal the digital keys used to decrypt HTTPs and TLS secured communications.

Adobe engineer Antonio Sanso discovered the flaw, which is rated as high severity by OpenSSL.

The attack requires multiple handshakes to be completed with a vulnerable OpenSSL peer that uses the same Diffie-Hellman exponent. Diffie-Hellman on OpenSSL must also be configured with parameters based on primes that are not safe to use for the attack to succeed, Sanso wrote.

Sanso reported the flaw to OpenSSL on January 13. The United States Computer Emergency Response Team (CERT) has also issued an alert about the vulnerability.

Users are advised to upgrade to OpenSSL 1.0.1r and 1.0.2f as soon as possible. It is also possible to enable the SSL_OP_SINGLE_DH_USE option to prevent primes being reused in the Diffie-Hellman protocol.

OpenSSL also strengthened the mitigation against the "Logjam" vulnerability discovered last year, which allowed attackers to downgrade Transport Layer Security (TLS) protected connections that used ephemeral Diffie-Hellman key exchanges, to weak, 512-bit export-grade cryptography.

The new versions of OpenSSL will now reject handshakes with Diffie-Hellman parameters shorter than 1024 bits, up from 768 bits, so as to offer stronger cryptographic assurance.

A low severity bug that could allow malicious clients to negotiate SSL version 2 ciphers disabled on servers and complete handshakes for the older protocol has also been fixed in OpenSSL 1.0.2f and 1.0.1r.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
diffiehellman openssl security small subgroups ssltls

Partner Content

MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
MSI launches innovative new laptops
Partner Content MSI launches innovative new laptops
Improving returns from SD-WAN spending
Sponsored Content Improving returns from SD-WAN spending
NCS expands into Australia in partnership with Optus Enterprise
Sponsored Content NCS expands into Australia in partnership with Optus Enterprise

Sponsored Whitepapers

The risky business of open source
The risky business of open source
Ensure your e-signatures are legally binding
Ensure your e-signatures are legally binding
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation
How to choose a WAF that's right for you
How to choose a WAF that's right for you
The global telco 5G cloud gaming opportunity
The global telco 5G cloud gaming opportunity

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • Beat the DDoS blackmailers in 2021
By Juha Saarinen, iTnews
Jan 29 2016
9:25AM
0 Comments

Related Articles

  • UNSW restarts search for new CISO
  • Reserve Bank of NZ governor apologises for 'serious' data breach
  • Google unravels state-of-art Android and Windows exploit chains
  • Mimecast says hackers hijacked its products
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Telstra blasts plan to 'set aside' mobile spectrum for Optus and TPG, but not it

Telstra blasts plan to 'set aside' mobile spectrum for Optus and TPG, but not it

Accellion hack behind Reserve Bank of NZ data breach

Accellion hack behind Reserve Bank of NZ data breach

Google unravels state-of-art Android and Windows exploit chains

Google unravels state-of-art Android and Windows exploit chains

Tyro halts trading following week-long outage

Tyro halts trading following week-long outage

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.