Cryptographic Issues Affecting openssl package, versions <1.0.0f-1
Threat Intelligence
EPSS
0.49% (77th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-OPENSSL-526931
- published 6 Jan 2012
- disclosed 6 Jan 2012
Introduced: 6 Jan 2012
CVE-2011-4108 Open this link in a new tabHow to fix?
Upgrade Debian:11
openssl
to version 1.0.0f-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
References
- https://security-tracker.debian.org/tracker/CVE-2011-4108
- http://support.apple.com/kb/HT5784
- http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
- http://www.kb.cert.org/vuls/id/737740
- https://security.paloaltonetworks.com/CVE-2011-4108
- http://www.debian.org/security/2012/dsa-2390
- http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html
- http://marc.info/?l=bugtraq&m=132750648501816&w=2
- http://marc.info/?l=bugtraq&m=133951357207000&w=2
- http://marc.info/?l=bugtraq&m=134039053214295&w=2
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- https://securityadvisories.paloaltonetworks.com/Home/Detail/17
- http://www.isg.rhul.ac.uk/~kp/dtls.pdf
- http://www.openssl.org/news/secadv_20120104.txt
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
- http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
- http://rhn.redhat.com/errata/RHSA-2012-1306.html
- http://rhn.redhat.com/errata/RHSA-2012-1307.html
- http://rhn.redhat.com/errata/RHSA-2012-1308.html
- http://secunia.com/advisories/48528
- http://secunia.com/advisories/57260
- http://secunia.com/advisories/57353
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:006
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:007
CVSS Scores
version 3.1