Improper Data Handling Affecting mysql56 package, versions <0:5.6.29-1.14.amzn1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-AMZN201803-MYSQL56-1695292
- published 27 Sep 2021
- disclosed 22 Jan 2016
Introduced: 22 Jan 2016
CVE-2015-7744 Open this link in a new tabHow to fix?
Upgrade Amazon-Linux:2018.03 mysql56 to version 0:5.6.29-1.14.amzn1 or higher.
This issue was patched in ALAS-2016-684.
NVD Description
Note: Versions mentioned in the description apply only to the upstream mysql56 package and not the mysql56 package as distributed by Amazon-Linux.
See How to fix? for Amazon-Linux:2018.03 relevant fixed versions and status.
wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
References
- https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html
- http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7744
- https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf
- https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/
- http://www.securitytracker.com/id/1034708
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html