Lucian Constantin
CSO Senior Writer

OpenSSL patches eight new vulnerabilities

news
Jan 9, 20152 mins

The flaws are of moderate and low severity, but server admins should still update

Server administrators are advised to upgrade OpenSSL again to fix eight new vulnerabilities, two of which can lead to denial-of-service (DoS) attacks.

The flaws are only of moderate and low severity, unlike the Heartbleed vulnerability discovered last year. Heartbleed could have allowed attackers to steal sensitive information including encryption keys from servers.

Nevertheless, “system administrators should plan to upgrade their running OpenSSL server instances in the coming days,” said Tod Beardsley, engineering manager at vulnerability intelligence firm Rapid7, via email Friday.

The newly released OpenSSL versions are 1.0.1k, 1.0.0p and 0.9.8zd.

Two denial-of-service vulnerabilities, tracked as CVE-2014-3571 and CVE-2015-0206, only affect OpenSSL’s implementation of the DTLS (Datagram Transport Layer Security) protocol, which is not as widely used as the TLS (Transport Layer Security) protocol.

DTLS provides encrypted communications over datagram protocols such as UDP and is used for things like VPN (Virtual Private Networks) and WebRTC (Web Real-Time Communication).

“In order to maintain reliable service, OpenSSL should be upgraded or replaced by SSL libraries not affected by these issues, such as LibreSSL,” Beardsley said.

Other flaws do apply to TLS and can lead to unexpected behavior when OpenSSL is built with the no-ssl3 option, a situation where the server accepts DH certificates for client authentication without the certificate verify message and a case where a client accepts an ECDH handshake despite a missing server key exchange message, which removes the forward secrecy property of the ciphersuite.

“We are still looking into the issues disclosed today,” Beardsley said. “While these vulnerabilities do not appear to lead to remote code execution or information disclosure, we will let the OpenSSL team know if we find any new, unexpected vectors of attack.”

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author