The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of OpenSSL: buffer overflow via EVP_XUpdate

Synthesis of the vulnerability 

An attacker can trigger a buffer overflow via EVP_XUpdate of OpenSSL, in order to trigger a denial of service, and possibly to run code.
Vulnerable software: SNS, Blue Coat CAS, ProxySG par Blue Coat, SGOS by Blue Coat, Broadcom Content Analysis, ProxySG by Symantec, SGOS by Symantec, Debian, AIX, IBM i, Tivoli Storage Manager, MySQL Community, MySQL Enterprise, NETASQ, Nodejs Core, OpenSSL, openSUSE Leap, Solaris, Percona Server, stunnel, SUSE Linux Enterprise Desktop, SLES, Ubuntu, VxWorks.
Severity of this announce: 2/4.
Creation date: 16/02/2021.
Références of this computer vulnerability: 6429603, 6443405, 6445489, CERTFR-2021-AVI-124, CERTFR-2021-AVI-187, cpuapr2021, CVE-2021-23840, DLA-2563-1, DLA-2565-1, DSA-4855-1, openSUSE-SU-2021:0357-1, openSUSE-SU-2021:0372-1, openSUSE-SU-2021:0427-1, openSUSE-SU-2021:0430-1, STORM-2021-002, SUSE-SU-2021:0649-1, SUSE-SU-2021:0651-1, SUSE-SU-2021:0673-1, SUSE-SU-2021:0674-1, SUSE-SU-2021:0725-1, SUSE-SU-2021:0752-1, SUSE-SU-2021:0753-1, SUSE-SU-2021:0754-1, SUSE-SU-2021:0755-1, SUSE-SU-2021:0769-1, SUSE-SU-2021:0793-1, SUSE-SU-2021:0939-1, SUSE-SU-2021:14667-1, SUSE-SU-2021:14670-1, SYMSA17570, USN-4738-1, VIGILANCE-VUL-34597.

Description of the vulnerability 

An attacker can trigger a buffer overflow via EVP_XUpdate of OpenSSL, in order to trigger a denial of service, and possibly to run code.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity alert impacts software or systems such as SNS, Blue Coat CAS, ProxySG par Blue Coat, SGOS by Blue Coat, Broadcom Content Analysis, ProxySG by Symantec, SGOS by Symantec, Debian, AIX, IBM i, Tivoli Storage Manager, MySQL Community, MySQL Enterprise, NETASQ, Nodejs Core, OpenSSL, openSUSE Leap, Solaris, Percona Server, stunnel, SUSE Linux Enterprise Desktop, SLES, Ubuntu, VxWorks.

Our Vigil@nce team determined that the severity of this weakness is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this security weakness.

Solutions for this threat 

OpenSSL: version 1.1.1j.
The version 1.1.1j is fixed:
  https://www.openssl.org/

OpenSSL: version 1.0.2y.
The version 1.0.2y is fixed:
  https://www.openssl.org/support/contracts.html#premium

AIX: patch for OpenSSL.
A patch is indicated in information sources.

Broadcom Content Analysis, ProxySG: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Debian 10: new openssl packages.
New packages are available:
  Debian 10: openssl 1.1.1d-0+deb10u5

Debian 9: new openssl1.0 packages.
New packages are available:
  Debian 9: openssl1.0 1.0.2u-1~deb9u4

Debian 9: new openssl packages.
New packages are available:
  Debian 9: openssl 1.1.0l-1~deb9u3

IBM i: patch for OpenSSL.
A patch is indicated in information sources.

IBM Spectrum Protect Backup-Archive Client NetApp Services: solution for OpenSSL.
The solution is indicated in information sources.

Node Core: version 10.24.0.
The version 10.24.0 is fixed:
  https://nodejs.org/en/download/

Node Core: version 12.21.0.
The version 12.21.0 is fixed:
  https://nodejs.org/en/download/

Node Core: version 14.16.0.
The version 14.16.0 is fixed:
  https://nodejs.org/en/download/

Node Core: version 15.10.0.
The version 15.10.0 is fixed:
  https://nodejs.org/en/download/

openSUSE Leap 15.2: new nodejs10 packages.
New packages are available:
  openSUSE Leap 15.2: nodejs10 10.24.0-lp152.2.12.1

openSUSE Leap 15.2: new nodejs12 packages.
New packages are available:
  openSUSE Leap 15.2: nodejs12 12.21.0-lp152.3.12.1

openSUSE Leap 15.2: new openssl-1_0_0 packages.
New packages are available:
  openSUSE Leap 15.2: openssl-1_0_0 1.0.2p-lp152.8.12.1

openSUSE Leap 15.2: new openssl-1_1 packages.
New packages are available:
  openSUSE Leap 15.2: openssl-1_1 1.1.1d-lp152.7.12.1

Oracle MySQL: version 5.7.34.
The version 5.7.34 is fixed:
  https://support.oracle.com/rs?type=doc&id=2764660.1
  https://www.mysql.com/fr/downloads/
  https://dev.mysql.com/downloads/mysql/

Oracle MySQL: version 8.0.24.
The version 8.0.24 is fixed:
  https://support.oracle.com/rs?type=doc&id=2764660.1
  https://www.mysql.com/fr/downloads/
  https://dev.mysql.com/downloads/mysql/

Oracle Solaris: patch for third party software of April 2021 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Stormshield Network Security: fixed versions for CipherUpdate.
The following versions are fixed:
  Stormshield Network Security: 2.7.9, 3.7.19, 3.11.7, 4.1.6 et 4.2.1

stunnel: version 5.58.
The version 5.58 is fixed:
  https://www.stunnel.org/downloads.html

SUSE LE 11 SP3: new openssl1 packages.
New packages are available:
  SUSE LE 11 SP3: openssl1 1.0.1g-0.58.33.1

SUSE LE 11 SP3: new openssl packages.
New packages are available:
  SUSE LE 11 SP3: openssl 0.9.8j-0.106.37.1
  SUSE LE 11 SP4: openssl 0.9.8j-0.106.37.1

SUSE LE 12: new nodejs10 packages.
New packages are available:
  SUSE LE 12 RTM-SP5: nodejs10 10.24.0-1.36.2

SUSE LE 12: new nodejs12 packages.
New packages are available:
  SUSE LE 12 RTM-SP5: nodejs12 12.21.0-1.29.2

SUSE LE 12 SP2-3: new openssl packages.
New packages are available:
  SUSE LE 12 SP2: openssl 1.0.2j-60.66.1
  SUSE LE 12 SP3: openssl 1.0.2j-60.66.1

SUSE LE 12 SP2-5: new compat-openssl098 packages.
New packages are available:
  SUSE LE 12 SP2: compat-openssl098 0.9.8j-106.24.1
  SUSE LE 12 SP3: compat-openssl098 0.9.8j-106.24.1
  SUSE LE 12 SP4: compat-openssl098 0.9.8j-106.24.1
  SUSE LE 12 SP5: compat-openssl098 0.9.8j-106.24.1

SUSE LE 12 SP4-5: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 12 SP4: openssl-1_0_0 1.0.2p-3.36.1
  SUSE LE 12 SP5: openssl-1_0_0 1.0.2p-3.36.1

SUSE LE 12 SP4-5: new openssl-1_1 packages.
New packages are available:
  SUSE LE 12 SP4: openssl-1_1 1.1.1d-2.30.1
  SUSE LE 12 SP5: openssl-1_1 1.1.1d-2.30.1

SUSE LE 15 RTM: new openssl-1_1 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_1 1.1.0i-4.57.1

SUSE LE 15 RTM-SP2: new nodejs10 packages.
New packages are available:
  SUSE LE 15 RTM: nodejs10 10.24.0-1.33.2
  SUSE LE 15 SP1: nodejs10 10.24.0-1.33.2
  SUSE LE 15 SP2: nodejs10 10.24.0-1.33.2

SUSE LE 15 RTM-SP3: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_0_0 1.0.2p-3.37.1
  SUSE LE 15 SP1: openssl-1_0_0 1.0.2p-3.37.1
  SUSE LE 15 SP2: openssl-1_0_0 1.0.2p-3.37.1
  SUSE LE 15 SP3: openssl-1_0_0 1.0.2p-3.37.1

SUSE LE 15 SP1: new openssl-1_1 packages.
New packages are available:
  SUSE LE 15 SP1: openssl-1_1 1.1.0i-14.15.1

SUSE LE 15 SP2: new nodejs12 packages.
New packages are available:
  SUSE LE 15 SP2: nodejs12 12.21.0-4.13.2

SUSE LE 15 SP2: new openssl-1_1 packages.
New packages are available:
  SUSE LE 15 SP2: openssl-1_1 1.1.1d-11.17.1

Ubuntu: new libssl packages.
New packages are available:
  Ubuntu 20.10: libssl1.1 1.1.1f-1ubuntu4.2
  Ubuntu 20.04 LTS: libssl1.1 1.1.1f-1ubuntu2.2
  Ubuntu 18.04 LTS: libssl1.0.0 1.0.2n-1ubuntu5.6, libssl1.1 1.1.1-1ubuntu2.1~18.04.8
  Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.19

VxWorks: version 21.03.
The version 21.03 is fixed:
  https://support.windriver.com/
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides network vulnerability announces. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.