Vigil@nce - OpenSSL: multiple vulnerabilities
March 2017 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of OpenSSL.
Impacted products: Blue Coat CAS, ProxyAV, ProxySG, SGOS, Cisco
ASR, Cisco ATA, AsyncOS, Cisco Catalyst, Cisco Content SMA, Cisco
ESA, IOS XE Cisco, IOS XR Cisco, Nexus by Cisco, NX-OS, Cisco
Prime Access Registrar, Prime Collaboration Assurance, Cisco Prime
DCNM, Prime Infrastructure, Cisco Router, Cisco CUCM, Cisco
MeetingPlace, Cisco Wireless IP Phone, Cisco WSA, Cisco Wireless
Controller, Debian, BIG-IP Hardware, TMOS, Fedora, FileZilla
Server, FreeBSD, AIX, Copssh, Juniper Network Connect, ePO,
Meinberg NTP Server, OpenSSL, openSUSE Leap, pfSense, Pulse
Connect Secure, Pulse Secure Client, RHEL, Slackware, stunnel,
Nessus, Ubuntu, VxWorks.
Severity: 2/4.
Creation date: 26/01/2017.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in OpenSSL.
An attacker can force a read at an invalid address via Truncated
Packet, in order to trigger a denial of service, or to obtain
sensitive information. [severity:2/4; CVE-2017-3731]
An attacker can force a NULL pointer to be dereferenced via
DHE/ECDHE Parameters, in order to trigger a denial of service.
[severity:2/4; CVE-2017-3730]
An attacker can use a carry propagation error via BN_mod_exp(), in
order to compute the private key. [severity:1/4; CVE-2017-3732]
An error occurs in the Broadwell-specific Montgomery
Multiplication Procedure, but with no apparent impact.
[severity:1/4; CVE-2016-7055]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/OpenSSL-multiple-vulnerabilities-21692