Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

SVG:Advisory-SVG-2014-6883

From EGIWiki
Revision as of 10:03, 9 April 2014 by Cornwall (talk | contribs) (Created page with "{svg-header} Please note this may get updated shortly. <pre> ** WHITE information - Unlimited distribution allowed ** ** see https://wiki.egi.eu/wiki/...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

{svg-header}

Please note this may get updated shortly.


** WHITE information - Unlimited distribution allowed                       **  
** see https://wiki.egi.eu/wiki/EGI_CSIRT:TLP for distribution restrictions **


EGI CSIRT ADVISORY [EGI-ADV-20140408] 

Title:       EGI SVG Advisory 'Critical' RISK - CVE-2014-0160 affecting OpenSSL [EGI-ADV-20140408]
Date:        2014-04-08 
Updated:     <date  yyyy-mm-dd>

URL:         https://wiki.egi.eu/wiki/EGI_CSIRT:Alerts/OpenSSL-2014-04-08  


Introduction
============

A vulnerability has been found in OpenSSL which allows unauthenticated remote attackers to access memory areas in vulnerable systems. 

It has been assigned CVE-2014-0160 [R 1].

Linux distributions with vulnerable OpenSSL versions include RHEL 6.5 and derivatives, and Ubuntu 12.04.4 LTS. In particular, note that RHEL
6.4 and earlier are not affected.


Details
=======

This vulnerability affects systems using OpenSSL.

OpenSSL has issued a brief advisory on this issue [R 2] A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64kB of memory to a connected client or server. 

This allows sensitive information like passwords, session cookies and contents of encrypted messages to be revealed to an unauthenticated user.
  
Sites need to patch vulnerable systems, with priority given to servers exposing SSL services, not forgetting to restart the services afterwards.

Sites will then need new certificates for the previously vulnerable hosts.

The vulnerability also affects client software that uses OpenSSL, which means that clients that connect to a malicious server could suffer from information leak.


Risk category
=============

This issue has been assessed as 'Critical' by the EGI SVG Risk Assessment Team and the CSIRT Team.


Affected software
=================

OpenSSL Versions 1.0.1 [a through f].

This issue is fixed in OpenSSL 1.0.1g. Versions of OpenSSL earlier than 1.0.1 are not affected.

Linux distributions with vulnerable OpenSSL versions include RHEL 6.5 and derivatives, and 
Ubuntu 12.04.4 LTS. In particular, note that RHEL 6.4 and earlier are not affected.


Mitigation
==========

N/A


Component installation information
==================================

All sites running a vulnerable OpenSSL version must upgrade to a patched version. 
Updates have been released by Red Hat, CentOS and Ubuntu and others.

Priority should be given to servers exposing SSL services, not forgetting to 
restart the services afterwards.

Then sites will need new certificates for the previously vulnerable hosts.

Once the site has installed the new certificates, the old ones must be revoked.


Recommendations
===============

All running resources MUST be either patched or temporarily removed From service as 
soon at possible, and at the latest by 2014-04-15T21:00+01:00. Sites failing to act 
and/or failing to respond to requests from the EGI CSIRT team risk site suspension.

Sites will then need new certificates for the previously vulnerable hosts. EGI CSIRT 
recommends that this is done in a staggered fashion according to how important/sensitive 
the services are, to ease the load on CA:s. Please note that this should only be done 
for hosts that have been running a vulnerable version of OpenSSL.

Sites should then revoke the old certificates. 

Then, finally, sites need to evaluate what other information that has been potentially 
exposed by this; e.g. passwords that were submitted to vulnerable servers.


Credit
======

EGI SVG and CSIRT was alerted to this vulnerability by Raul Lopes and David Kelsey.


References
==========

[R 1] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160

[R 2] http://www.openssl.org/news/secadv_20140407.txt

[R 3] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0160


Timeline
========
Yyyy-mm-dd

2014-04-08 EGI and SVG alerted to this Publicly disclosed vulnerability
2014-04-08 Acknowledgement from the EGI SVG
2014-04-08 EGI SVG and CSIRT consider 'Critical'
2014-04-08 Alert issued with 7 day deadline