Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Over a Dozen Vulnerabilities Patched in OpenSSL

The OpenSSL Project announced on Thursday that more than a dozen vulnerabilities have been patched in OpenSSL with the release of versions 1.1.0a, 1.0.2i and 1.0.1u.

The OpenSSL Project announced on Thursday that more than a dozen vulnerabilities have been patched in OpenSSL with the release of versions 1.1.0a, 1.0.2i and 1.0.1u.

The latest versions of the cryptographic software library fix only one high severity issue. The flaw, tracked as CVE-2016-6304, can be exploited for denial-of-service (DoS) attacks by sending the targeted server an excessively large OCSP Status Request extension that causes memory exhaustion.

The OpenSSL Project has pointed out that the security hole affects servers in their default configuration even if they don’t support OCSP, but builds using the “no-ocsp” option are not impacted. Furthermore, servers using OpenSSL prior to 1.0.1g are not vulnerable in their default configuration.

The vulnerability was reported to OpenSSL developers by Shi Lei, a researcher at Chinese security firm Qihoo 360. The expert has been credited for finding many of the weaknesses patched this week.

OpenSSL 1.1.0, a branch that was launched less than one month ago, is affected by a moderate severity flaw (CVE-2016-6305) that can also be exploited for DoS attacks.

A total of 12 low severity vulnerabilities have also been resolved in the latest versions of OpenSSL. It’s worth noting that most of them don’t affect the 1.1.0 branch.

The list of low severity issues includes Sweet32, a recently disclosed birthday attack method against 64-bit block ciphers in TLS and OpenVPN (CVE-2016-2183). Researchers demonstrated that a network attacker who can monitor a long-lived HTTPS connection between a browser and a website might be able to recover HTTP cookies if they can capture a large volume of traffic.

OpenSSL has disabled the problematic ciphersuites in version 1.1.0, and moved them from the high to the medium cipherstring group in the 1.0.1 and 1.0.2 versions in an effort to prevent Sweet32 attacks.

Advertisement. Scroll to continue reading.

Citrix also published a blog post this week detailing the Sweet32 attack method. The company noted that the attack is not easy to carry out, but advised customers to move away from DES ciphers and use AES instead.

Related Reading: Encrypted Network Traffic Comes at a Cost

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.