Vigil@nce - OpenSSL: denial of service via ServerKeyExchange
February 2016 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can send a malicious ServerKeyExchange message to a
client compiled with OpenSSL, in order to trigger a denial of
service.
Impacted products: IRAD, Data ONTAP, OpenSSL, Puppet, Slackware,
Ubuntu.
Severity: 2/4.
Creation date: 04/12/2015.
DESCRIPTION OF THE VULNERABILITY
The OpenSSL library implements TLS with the anonymous DH
ciphersuite.
However, if the TLS server sends a ServerKeyExchange message with
a value of p parameter set to zero, a fatal error occurs in the
client linked to OpenSSL.
An attacker can therefore send a malicious ServerKeyExchange
message to a client compiled with OpenSSL, in order to trigger a
denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/OpenSSL-denial-of-service-via-ServerKeyExchange-18443