OpenSSL Patches 7 Security Flaws — 2 Critical

If there is any good news from the discovery of the Heartbleed bug that affects OpenSSL, itEUs this: security analysts are keeping a closer watch on OpenSSL. And their efforts have paid off. The open-source OpenSSL Project today released a security update that fixes seven vulnerabilities, including two that have been rated critical by the SANS Internet Storm Center.

The first critical flaw is the SSL/TLS MiTM flaw (CVE-2014-0224). EUAn attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers,EU according to the OpenSSL team's update. EUThis can be exploited by a man-in-the-middle (MiTM) attack where the attacker can decrypt and modify traffic from the attacked client and server.EU

Around for 16 Years

The flaw was discovered by researcher Masashi Kikuchi of Lepidum Co. Ltd., who noted in a blog post that it had been around for over 16 years -- since the very first release of OpenSSL.

EUThe biggest reason why the bug hasnEUt been found for over 16 years is that code reviews were insufficient, especially from experts who had experiences with TLS/SSL implementation,EU he said in the post. EUIf the reviewers had enough experiences, they should have verified OpenSSL code in the same way they do their own code. They could have detected the problem.EU

The OpenSSL team said the MiTM attack can only be performed if both the client and the server are vulnerable. OpenSSL clients are vulnerable in all versions of OpenSSL, while servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 should upgrade as a precaution.

Critical Flaw #2

The other OpenSSL vulnerability rated as critical by the SANS Internet Storm Center (ISC) is for the flaw identified as CVE-2014-0195. It is a Datagram Transport Layer Security (DTLS)...

Comments are closed.