Hello all,
I've been tasked to look at some security issues for our OpenSSL
implementation. We are currently at FIPS 1.2.2 and openssl 0.9.8k. Most
of the issues I was asked to look at were no issue for us, but the below
item I'm less certain about. Since we are FIPS does this have any chance
of affecting us? We do use the SSLv23_server method in the call of
SSL_CTX_new.
Uninitialized SSL 3.0 Padding - (CVE-2011-4576):
OpenSSL prior to 1.0.0f and 0.9.8s failed to clear the bytes used as block
cipher padding in SSL 3.0 records. This affects both clients and servers
that accept SSL 3.0 handshakes: those that call SSL_CTX_new with
SSLv3_{server|client}_method or SSLv23_{server|client}_method. It does not
affect TLS. As a result, in each record, up to 15 bytes of uninitialized
memory may be sent, encrypted, to the SSL peer. This could include
sensitive
contents of previously freed memory. However, in practice, most
deployments
do not use SSL_MODE_RELEASE_BUFFERS and therefore have a single write
buffer
per connection. That write buffer is partially filled with non-sensitive,
handshake data at the beginning of the connection and, thereafter, only
records which are longer any any previously sent record leak any
non-encrypted data. This, combined with the small number of bytes leaked
per
record, serves to limit to severity of this issue.
Thanks,
Jerry
Gerald Collins
Senior Member Technical Staff, Programmer / Analyst
CSC
8 Executive Drive, Suite 300, Fairview Heights, IL 62208 North American
Public Sector | p: +1-618-632-9252 x410 | | [email protected] |
www.csc.com
This is a PRIVATE message. If you are not the intended recipient, please
delete without copying and kindly advise us by e-mail of the mistake in
delivery.
NOTE: Regardless of content, this e-mail shall not operate to bind CSC to
any order or other contract unless pursuant to explicit written agreement
or government initiative expressly permitting the use of e-mail for such
purpose.