Vigil@nce - OpenSSL: three vulnerabilities
January 2017 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of OpenSSL.
Impacted products: Cisco ASR, Cisco Aironet, Cisco ATA, Cisco
AnyConnect Secure Mobility Client, ASA, AsyncOS, Cisco Content
SMA, Cisco ESA, IOS by Cisco, IOS XE Cisco, IOS XR Cisco, Nexus by
Cisco, NX-OS, Cisco Prime Access Registrar, Prime Collaboration
Assurance, Prime Collaboration Manager, Cisco Prime DCNM, Prime
Infrastructure, Cisco Prime LMS, Cisco Router, Secure ACS, Cisco
CUCM, Cisco Unified CCX, Cisco IP Phone, Cisco MeetingPlace, Cisco
Wireless IP Phone, Cisco WSA, Cisco Wireless Controller,
NetWorker, VNX Operating Environment, VNX Series, OpenSSL.
Severity: 2/4.
Creation date: 10/11/2016.
Revision date: 13/12/2016.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in OpenSSL.
An attacker can generate a buffer overflow via ChaCha20/Poly1305,
in order to trigger a denial of service. [severity:2/4;
CVE-2016-7054]
An attacker can force a NULL pointer to be dereferenced via CMS
Structures, in order to trigger a denial of service.
[severity:2/4; CVE-2016-7053]
An error occurs in the Broadwell-specific Montgomery
Multiplication Procedure, but with no apparent impact.
[severity:1/4; CVE-2016-7055]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/OpenSSL-three-vulnerabilities-21093