• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
openssl fixes multiple new security flaws with latest update

OpenSSL Fixes Multiple New Security Flaws with Latest Update

You are here: Home / General Cyber Security News / OpenSSL Fixes Multiple New Security Flaws with Latest Update
February 9, 2023

The OpenSSL Task has released fixes to address a number of security flaws, together with a large-severity bug in the open up supply encryption toolkit that could likely expose consumers to destructive attacks.

Tracked as CVE-2023-0286, the issue relates to a scenario of kind confusion that could allow an adversary to “go through memory contents or enact a denial-of-service,” the maintainers explained in an advisory.

The vulnerability is rooted in the way the well known cryptographic library handles X.509 certificates, and is likely to influence only those people programs that have a customized implementation for retrieving a certificate revocation record (CRL) over a network.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“In most cases, the attack needs the attacker to provide the two the certification chain and CRL, neither of which need to have a legitimate signature,” OpenSSL said. “If the attacker only controls one of these inputs, the other enter ought to by now incorporate an X.400 address as a CRL distribution stage, which is unusual.”

Form confusion flaws could have major implications, as they could be weaponized to deliberately power the application to behave in unintended means, quite possibly creating a crash or code execution.

The issue has been patched in OpenSSL versions 3..8, 1.1.1t, and 1..2zg. Other security flaws tackled as portion of the most recent updates incorporate:

  • CVE-2022-4203 – X.509 Name Constraints Read through Buffer Overflow
  • CVE-2022-4304 – Timing Oracle in RSA Decryption
  • CVE-2022-4450 – Double free just after contacting PEM_go through_bio_ex
  • CVE-2023-0215 – Use-right after-no cost following BIO_new_NDEF
  • CVE-2023-0216 – Invalid pointer dereference in d2i_PKCS7 features
  • CVE-2023-0217 – NULL dereference validating DSA public essential
  • CVE-2023-0401 – NULL dereference throughout PKCS7 info verification

Effective exploitation of the higher than shortcomings could lead to an application crash, disclose memory contents, and even recuperate plaintext messages sent around a network by using edge of a timing-primarily based side-channel in what is actually a Bleichenbacher-model attack.

The fixes arrive virtually two months just after OpenSSL plugged a reduced-severity flaw (CVE-2022-3996) that occurs when processing an X.509 certification, resulting in a denial-of-company condition.

Identified this article attention-grabbing? Comply with us on Twitter  and LinkedIn to read far more distinctive information we post.


Some sections of this posting are sourced from:
thehackernews.com

Previous Post: «Cyber Security News New Info-Stealer Discovered as Russia Prepares Fresh Offensive
Next Post: Trio Arrested in COVID PPE Fraud Probe Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Unveils Ransomware Notification Initiative
  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
  • GitHub Updates Security Protocol For Operations Over SSH
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet

Copyright © TheCyberSecurity.News, All Rights Reserved.