ALAS-2016-695 ---- opensslID: oval:org.secpod.oval:def:1600397 | Date: (C)2016-05-19 (M)2024-02-19 |
Class: PATCH | Family: unix |
A vulnerability was discovered that allows a man-in-the-middle attacker to use a padding oracle attack to decrypt traffic on a connection using an AES CBC cipher with a server supporting AES-NI. It was discovered that the ASN.1 parser can misinterpret a large universal tag as a negative value. If an application deserializes and later reserializes untrusted ASN.1 structures containing an ANY field, an attacker may be able to trigger an out-of-bounds write, which can cause potentially exploitable memory corruption. An overflow bug was discovered in the EVP_EncodeUpdate function. An attacker could supply very large amounts of input data to overflow a length check, resulting in heap corruption. An overflow bug was discovered in the EVP_EncryptUpdate function. An attacker could supply very large amounts of input data to overflow a length check, resulting in heap corruption. An issue was discovered in the BIO functions, such as d2i_CMS_bio, where a short invalid encoding in ASN.1 data can cause allocation of large amounts of memory, potentially resulting in a denial of service
Platform: |
Amazon Linux AMI |