Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

OpenSSL to Patch High Severity Flaw in Version 1.1.0

The OpenSSL Project informed users on Monday that it’s preparing a patch for several vulnerabilities affecting version 1.1.0.

OpenSSL version 1.1.0c, which is scheduled for release on November 10 between 12:00 and 16:00 UTC, will address several security holes. The most serious of them has been classified as “high severity” and it does not affect versions prior to 1.1.0.

The OpenSSL Project informed users on Monday that it’s preparing a patch for several vulnerabilities affecting version 1.1.0.

OpenSSL version 1.1.0c, which is scheduled for release on November 10 between 12:00 and 16:00 UTC, will address several security holes. The most serious of them has been classified as “high severity” and it does not affect versions prior to 1.1.0.

In September, the OpenSSL Project released updates that patched more than a dozen vulnerabilities, but most of them did not affect the recently launched 1.1.0 branch.

One of the issues patched at the time in OpenSSL 1.1.0 was a low severity denial-of-service (DoS) flaw related to excessive allocation of memory in the tls_get_message_header() function. The vulnerability, tracked as CVE-2016-6307, is considered low severity as it can only be exploited if certain conditions are met.

However, Google Security Engineer Robert Swiecki discovered that the patch for CVE-2016-6307 introduced a critical use-after-free vulnerability that could lead to a crash and even arbitrary code execution. A second update for the 1.1.0 branch was released within days to address this new flaw (CVE-2016-6309).

A total of five OpenSSL security updates have been released this year to patch more than 30 vulnerabilities, including five rated high severity and one rated critical.

Related: Non-Security OpenSSL Bugs Lead to Serious Vulnerability

Related: Severe OpenSSL Flaw Exposes TLS Traffic

Related: Encrypted Network Traffic Comes at a Cost

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Vulnerabilities

Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.