[vox] [Fwd: Vulnerability in OpenSSL]

Mike Simons vox@lists.lugod.org
Fri, 14 Mar 2003 16:25:18 -0500


On Fri, Mar 14, 2003 at 10:58:59AM -0800, ME wrote:
> An item that may have implications for other packages that compile against
> OpenSSL that include mod_ssl, openssh, and if you specified it in a bind
> install (or your package was so configured) BIND too.
[...]
> If this attack is addressed, then expect many new packages and package
> upgrades for your boxes from your Linux vendor for several packages
> related to encryption.

  There area patched ssl that went into Debian Feb 21... which fixes
timing-based attacks.

====
openssl (0.9.6c-2.woody.2) stable-security; urgency=high

  * Non-maintainer upload by the Security Team
  * Applied patch to fix vulnerability to timing-based attacks
    (see CAN-2003-0078)
  * Applied preventative measure patch by Richard Levitte
    <levitte@openssl.org>

 -- Martin Schulze <joey@infodrom.org>  Fri, 21 Feb 2003 16:34:17 +0100
====

  The people given credit for the paper leading to the patch are not 
the people in your report... 

http://lists.debian.org/debian-security-announce/debian-security-announce-2003/msg00035.html
===
A vulnerability has been discovered in OpenSSL, a Secure Socket Layer
(SSL) implementation.  In an upcoming paper, Brice Canvel (EPFL),
Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux (EPFL,
Ilion) describe and demonstrate a timing-based attack on CBC cipher
suites used in SSL and TLS.  OpenSSL has been found to vulnerable to
this attack.
===

  David Brumley, doesn't report which version of ssl he was using in
his tests... so it's hard to tell if these two things are the same
issue or not.

- is there any indication on your list if this problem has already
  been fixed?

> -------- Original Message --------
> Subject: Vulnerability in OpenSSL
> From: David Brumley <dbrumley@stanford.edu>
> Date: Thu, March 13, 2003 3:59 pm
> To: bugtraq@securityfocus.com
> 
> Dan Boneh and I have been researching timing attacks against software
[...]
> To our knowledge, OpenSSL and derived crypto libraries are vulnerable.
[...]
> The results indicate that all crypto implementations should defend
> against timing attacks.
[...]
> http://crypto.stanford.edu/~dabo/abstracts/ssl-timing.html
[...]
> -David Brumley