The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

weakness CVE-2018-0732

OpenSSL: denial of service via Large DH Parameter

Synthesis of the vulnerability

An attacker can generate a fatal error via Large DH Parameter of OpenSSL, in order to trigger a denial of service.
Severity of this alert: 2/4.
Creation date: 12/06/2018.
Références of this alert: bulletinjul2018, CERTFR-2018-AVI-511, CERTFR-2018-AVI-607, cpuapr2019, cpujan2019, cpujul2019, cpuoct2018, CVE-2018-0732, DLA-1449-1, DSA-4348-1, DSA-4355-1, FEDORA-2019-00c25b9379, ibm10719319, ibm10729805, ibm10738401, ibm10743283, ibm10874728, JSA10919, K21665601, openSUSE-SU-2018:1906-1, openSUSE-SU-2018:2117-1, openSUSE-SU-2018:2129-1, openSUSE-SU-2018:2667-1, openSUSE-SU-2018:2695-1, openSUSE-SU-2018:2816-1, openSUSE-SU-2018:2855-1, openSUSE-SU-2018:3013-1, openSUSE-SU-2018:3015-1, PAN-SA-2018-0015, RHSA-2018:3221-01, SSA:2018-226-01, SUSE-SU-2018:1887-1, SUSE-SU-2018:1968-1, SUSE-SU-2018:2036-1, SUSE-SU-2018:2041-1, SUSE-SU-2018:2207-1, SUSE-SU-2018:2647-1, SUSE-SU-2018:2683-1, SUSE-SU-2018:2812-1, SUSE-SU-2018:2956-1, SUSE-SU-2018:2965-1, SUSE-SU-2019:1553-1, SYMSA1462, TNS-2018-14, TNS-2018-17, TSB17568, USN-3692-1, USN-3692-2, VIGILANCE-VUL-26375.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can generate a fatal error via Large DH Parameter of OpenSSL, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

This vulnerability announce impacts software or systems such as Blue Coat CAS, ProxyAV, ProxyRA, ProxySG par Blue Coat, SGOS by Blue Coat, Debian, BIG-IP Hardware, TMOS, Fedora, AIX, IBM i, Rational ClearCase, QRadar SIEM, Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series, MariaDB ~ precise, MySQL Community, MySQL Enterprise, Nodejs Core, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, VirtualBox, WebLogic, Palo Alto Firewall PA***, PAN-OS, Percona Server, XtraBackup, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, ProxySG by Symantec, SGOS by Symantec, Synology DSM, Synology DS***, Synology RS***, Nessus, Ubuntu, X2GoClient.

Our Vigil@nce team determined that the severity of this cybersecurity threat is medium.

The trust level is of type confirmed by the editor, with an origin of internet server.

An attacker with a expert ability can exploit this computer threat bulletin.

Solutions for this threat

OpenSSL: version 1.1.0i.
The version 1.1.0i is fixed:
  https://www.openssl.org/source/

OpenSSL: version 1.0.2p.
The version 1.0.2p is fixed:
  https://www.openssl.org/source/

OpenSSL: patch for Large DH Parameter.
A patch is indicated in information sources.

AIX: solution for OpenSSL.
The solution is indicated in information sources.

Copssh: version 6.2.2.
The version 6.2.2 is fixed:
  https://www.itefix.net/copssh

Debian 8: new openssl packages.
New packages are available:
  Debian 8: openssl 1.0.1t-1+deb8u9

Debian 9: new openssl1.0 packages.
New packages are available:
  Debian 9: openssl1.0 1.0.2q-1~deb9u1

Debian 9: new openssl packages.
New packages are available:
  Debian 9: openssl 1.1.0j-1~deb9u1

F5 BIG-IP: solution for OpenSSL.
The solution is indicated in information sources.

Fedora 30: new compat-openssl10 packages.
New packages are available:
  Fedora 30: compat-openssl10 1.0.2o-7.fc30

IBM BigFix Platform: solution for Curl/OpenSSL.
The solution is indicated in information sources.

IBM BigFix Remote Control: solution for Java.
The solution is indicated in information sources.

IBM i: patch for OpenSSL.
A patch is indicated in information sources.

IBM QRadar SIEM: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

IBM Rational ClearCase: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Junos OS: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

MariaDB: version 5.5.63.
The version 5.5.63 is fixed:
  https://mariadb.com/downloads/

Nessus: version 7.1.4.
The version 7.1.4 is fixed:
  https://www.tenable.com/

Node Core: version 10.5.0.
The version 10.5.0 is fixed:
  https://nodejs.org/en/download/

Node Core: version 10.9.0.
The version 10.9.0 is fixed:
  https://nodejs.org/en/download/

Node Core: version 6.14.4.
The version 6.14.4 is fixed:
  https://nodejs.org/en/download/

Node Core: version 8.11.4.
The version 8.11.4 is fixed:
  https://nodejs.org/en/download/

openSUSE Leap 15.0: new nodejs8 packages.
New packages are available:
  openSUSE Leap 15.0: nodejs8 8.11.4-lp150.2.6.1

openSUSE Leap 15.0: new openssl-1_0_0 packages (05/10/2018).
New packages are available:
  openSUSE Leap 15.0: openssl-1_0_0 1.0.2p-lp150.2.6.1

openSUSE Leap 15.0: new openssl-1_0_0 packages (30/07/2018).
New packages are available:
  openSUSE Leap 15.0: openssl-1_0_0 1.0.2n-lp150.2.3.1

openSUSE Leap 15.0: new openssl-1_1 packages (05/10/2018).
New packages are available:
  openSUSE Leap 15.0: openssl-1_1 1.1.0i-lp150.3.9.1

openSUSE Leap 15.0: new openssl-1_1 packages (30/07/2018).
New packages are available:
  openSUSE Leap 15.0: openssl-1_1 1.1.0h-lp150.3.3.1

openSUSE Leap 42.3: new compat-openssl098 packages.
New packages are available:
  openSUSE Leap 42.3: compat-openssl098 0.9.8j-24.1

openSUSE Leap 42.3: new nodejs4 packages.
New packages are available:
  openSUSE Leap 42.3: nodejs4 4.9.1-17.1

openSUSE Leap 42.3: new nodejs6 packages.
New packages are available:
  openSUSE Leap 42.3: nodejs6 6.14.4-15.1

openSUSE Leap 42.3: new openssl packages.
New packages are available:
  openSUSE Leap 42.3: openssl 1.0.2j-25.1

Oracle Communications: CPU of April 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2518758.1
  https://support.oracle.com/rs?type=doc&id=2518763.1
  https://support.oracle.com/rs?type=doc&id=2522151.1
  https://support.oracle.com/rs?type=doc&id=2519787.1
  https://support.oracle.com/rs?type=doc&id=2522126.1
  https://support.oracle.com/rs?type=doc&id=2522123.1
  https://support.oracle.com/rs?type=doc&id=2518753.1
  https://support.oracle.com/rs?type=doc&id=2522121.1
  https://support.oracle.com/rs?type=doc&id=2528862.1
  https://support.oracle.com/rs?type=doc&id=2518754.1

Oracle Communications: CPU of January 2019.
A Critical Patch Update is available:
  https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Oracle Communications: CPU of July 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2559239.1
  https://support.oracle.com/rs?type=doc&id=2563691.1
  https://support.oracle.com/rs?type=doc&id=2559240.1
  https://support.oracle.com/rs?type=doc&id=2559722.1
  https://support.oracle.com/rs?type=doc&id=2559225.1
  https://support.oracle.com/rs?type=doc&id=2559721.1
  https://support.oracle.com/rs?type=doc&id=2559256.1
  https://support.oracle.com/rs?type=doc&id=2559242.1
  https://support.oracle.com/rs?type=doc&id=2559243.1
  https://support.oracle.com/rs?type=doc&id=2559648.1

Oracle Fusion Middleware: CPU of January 2019.
A Critical Patch Update is available:
  https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Oracle Fusion Middleware: CPU of Octobre 2018.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2433477.1

Oracle MySQL: version 5.6.43.
The version 5.6.43 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle MySQL: version 5.7.25.
The version 5.7.25 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle MySQL: version 8.0.14.
The version 8.0.14 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle Solaris: patch for third party software of July 2018 v3.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Oracle VM VirtualBox: version 5.2.20.
The version 5.2.20 is fixed:
  https://www.virtualbox.org/

Palo Alto PAN-OS: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Percona Server for MySQL: version 5.7.25-28.
The version 5.7.25-28 is fixed:
  https://www.percona.com/

RHEL 7: new openssl packages.
New packages are available:
  RHEL 7: openssl 1.0.2k-16.el7

Slackware: new openssl packages.
New packages are available:
  Slackware 14.2: openssl 1.0.2p-*-1_slack14.2

SUSE LE 11: new openssl packages.
New packages are available:
  SUSE LE 11 SP4: openssl 0.9.8j-0.106.12.1

SUSE LE 12: new nodejs4 packages.
New packages are available:
  SUSE LE 12 RTM-SP3: nodejs4 4.9.1-15.14.1

SUSE LE 12 RTM: new openssl packages (19/06/2019).
New packages are available:
  SUSE LE 12 RTM: openssl 1.0.1i-27.34.1

SUSE LE 12 SP1: new openssl packages.
New packages are available:
  SUSE LE 12 SP1: openssl 1.0.1i-54.14.1

SUSE LE 12 SP2/3: new openssl packages.
New packages are available:
  SUSE LE 12 SP2: openssl 1.0.2j-60.30.1
  SUSE LE 12 SP3: openssl 1.0.2j-60.30.1

SUSE LE 12 SP3: new compat-openssl098 packages.
New packages are available:
  SUSE LE 12 SP3: compat-openssl098 0.9.8j-106.6.1

SUSE LE 15: new nodejs8 packages.
New packages are available:
  SUSE LE 15 RTM: nodejs8 8.11.4-3.8.2

SUSE LE 15: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_0_0 1.0.2p-3.8.1

SUSE LE 15: new openssl-1_1 packages (01/10/2018).
New packages are available:
  SUSE LE 15 RTM: openssl-1_1 1.1.0i-4.9.2

SUSE LE 15: new openssl-1_1 packages (24/07/2018).
New packages are available:
  SUSE LE 15 RTM: openssl-1_1 1.1.0h-4.3.1, openssl-1_0_0 1.0.2n-3.3.1

Symantec: solution for OpenSSL.
The solution is indicated in information sources.

Synology DSM: version 6.2.2-24922.
The version 6.2.2-24922 is fixed.

Synology DS/RS: version 6.2.2-24922.
The version 6.2.2-24922 is fixed:
  https://www.synology.com/

Tenable Nessus: version 8.0.0.
The version 8.0.0 is fixed:
  https://www.tenable.com/

Ubuntu: new libssl1 packages.
New packages are available:
  Ubuntu 18.04 LTS: libssl1.0.0 1.0.2n-1ubuntu5.1, libssl1.1 1.1.0g-2ubuntu4.1
  Ubuntu 17.10: libssl1.0.0 1.0.2g-1ubuntu13.6
  Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.13
  Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.26
  Ubuntu 12.04 ESM: libssl1.0.0 1.0.1-4ubuntu5.43

X2Go Client: version 4.1.2.0.
The version 4.1.2.0 is fixed:
  https://wiki.x2go.org/doku.php
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a networks vulnerabilities watch. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The technology watch team tracks security threats targeting the computer system.