The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of OpenSSL: denial of service via Large DH Parameter

Synthesis of the vulnerability 

An attacker can generate a fatal error via Large DH Parameter of OpenSSL, in order to trigger a denial of service.
Impacted systems: Blue Coat CAS, ProxyAV, ProxyRA, ProxySG par Blue Coat, SGOS by Blue Coat, Broadcom Content Analysis, ProxySG by Symantec, SGOS by Symantec, Debian, Unisphere EMC, VNX Operating Environment, VNX Series, BIG-IP Hardware, TMOS, Fedora, AIX, IBM i, Rational ClearCase, QRadar SIEM, Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series, Juniper SBR, MariaDB ~ precise, MySQL Community, MySQL Enterprise, Nodejs Core, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, VirtualBox, WebLogic, Palo Alto Firewall PA***, PAN-OS, Percona Server, XtraBackup, Pulse Connect Secure, Pulse Secure Client, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Nessus, Ubuntu, X2GoClient.
Severity of this alert: 2/4.
Creation date: 12/06/2018.
Références of this alert: bulletinjul2018, CERTFR-2018-AVI-511, CERTFR-2018-AVI-607, cpuapr2019, cpuapr2020, cpujan2019, cpujul2019, cpuoct2018, CVE-2018-0732, DLA-1449-1, DSA-2019-197, DSA-2020-030, DSA-2020-062, DSA-4348-1, DSA-4355-1, FEDORA-2019-00c25b9379, ibm10719319, ibm10729805, ibm10738401, ibm10743283, ibm10874728, JSA10919, JSA10990, K21665601, openSUSE-SU-2018:1906-1, openSUSE-SU-2018:2117-1, openSUSE-SU-2018:2129-1, openSUSE-SU-2018:2667-1, openSUSE-SU-2018:2695-1, openSUSE-SU-2018:2816-1, openSUSE-SU-2018:2855-1, openSUSE-SU-2018:3013-1, openSUSE-SU-2018:3015-1, PAN-SA-2018-0015, RHSA-2018:3221-01, SA44073-2019-03, SSA:2018-226-01, SUSE-SU-2018:1887-1, SUSE-SU-2018:1968-1, SUSE-SU-2018:2036-1, SUSE-SU-2018:2041-1, SUSE-SU-2018:2207-1, SUSE-SU-2018:2647-1, SUSE-SU-2018:2683-1, SUSE-SU-2018:2812-1, SUSE-SU-2018:2956-1, SUSE-SU-2018:2965-1, SUSE-SU-2019:14246-1, SUSE-SU-2019:1553-1, SYMSA1462, TNS-2018-14, TNS-2018-17, TSB17568, USN-3692-1, USN-3692-2, VIGILANCE-VUL-26375.

Description of the vulnerability 

An attacker can generate a fatal error via Large DH Parameter of OpenSSL, in order to trigger a denial of service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability announce impacts software or systems such as Blue Coat CAS, ProxyAV, ProxyRA, ProxySG par Blue Coat, SGOS by Blue Coat, Broadcom Content Analysis, ProxySG by Symantec, SGOS by Symantec, Debian, Unisphere EMC, VNX Operating Environment, VNX Series, BIG-IP Hardware, TMOS, Fedora, AIX, IBM i, Rational ClearCase, QRadar SIEM, Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series, Juniper SBR, MariaDB ~ precise, MySQL Community, MySQL Enterprise, Nodejs Core, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, VirtualBox, WebLogic, Palo Alto Firewall PA***, PAN-OS, Percona Server, XtraBackup, Pulse Connect Secure, Pulse Secure Client, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Nessus, Ubuntu, X2GoClient.

Our Vigil@nce team determined that the severity of this cybersecurity threat is medium.

The trust level is of type confirmed by the editor, with an origin of internet server.

An attacker with a expert ability can exploit this computer threat bulletin.

Solutions for this threat 

OpenSSL: version 1.1.0i.
The version 1.1.0i is fixed:
  https://www.openssl.org/source/

OpenSSL: version 1.0.2p.
The version 1.0.2p is fixed:
  https://www.openssl.org/source/

OpenSSL: patch for Large DH Parameter.
A patch is indicated in information sources.

AIX: solution for OpenSSL.
The solution is indicated in information sources.

Copssh: version 6.2.2.
The version 6.2.2 is fixed:
  https://www.itefix.net/copssh

Debian 8: new openssl packages.
New packages are available:
  Debian 8: openssl 1.0.1t-1+deb8u9

Debian 9: new openssl1.0 packages.
New packages are available:
  Debian 9: openssl1.0 1.0.2q-1~deb9u1

Debian 9: new openssl packages.
New packages are available:
  Debian 9: openssl 1.1.0j-1~deb9u1

Dell EMC Unisphere for PowerMax: solution.
The solution is indicated in information sources.

Dell EMC VNXe3200: version 3.1.11.10003441.
The version 3.1.11.10003441 is fixed:
  https://www.dell.com/support/

Dell EMC VNXe: version MR4 Service Pack 5.
The version MR4 Service Pack 5 is fixed:
  https://www.dell.com/support/

F5 BIG-IP: solution for OpenSSL.
The solution is indicated in information sources.

Fedora 30: new compat-openssl10 packages.
New packages are available:
  Fedora 30: compat-openssl10 1.0.2o-7.fc30

IBM BigFix Platform: solution for Curl/OpenSSL.
The solution is indicated in information sources.

IBM BigFix Remote Control: solution for Java.
The solution is indicated in information sources.

IBM i: patch for OpenSSL.
A patch is indicated in information sources.

IBM QRadar SIEM: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

IBM Rational ClearCase: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Juniper SBR Carrier: versions 8.4.1R13 and 8.5.0R4.
Versions 8.4.1R13 and 8.5.0R4 are fixed:
  https://support.juniper.net/support/

Junos OS: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

MariaDB: version 5.5.63.
The version 5.5.63 is fixed:
  https://mariadb.com/downloads/

Nessus: version 7.1.4.
The version 7.1.4 is fixed:
  https://www.tenable.com/

Node Core: version 10.5.0.
The version 10.5.0 is fixed:
  https://nodejs.org/en/download/

Node Core: version 10.9.0.
The version 10.9.0 is fixed:
  https://nodejs.org/en/download/

Node Core: version 6.14.4.
The version 6.14.4 is fixed:
  https://nodejs.org/en/download/

Node Core: version 8.11.4.
The version 8.11.4 is fixed:
  https://nodejs.org/en/download/

openSUSE Leap 15.0: new nodejs8 packages.
New packages are available:
  openSUSE Leap 15.0: nodejs8 8.11.4-lp150.2.6.1

openSUSE Leap 15.0: new openssl-1_0_0 packages (05/10/2018).
New packages are available:
  openSUSE Leap 15.0: openssl-1_0_0 1.0.2p-lp150.2.6.1

openSUSE Leap 15.0: new openssl-1_0_0 packages (30/07/2018).
New packages are available:
  openSUSE Leap 15.0: openssl-1_0_0 1.0.2n-lp150.2.3.1

openSUSE Leap 15.0: new openssl-1_1 packages (05/10/2018).
New packages are available:
  openSUSE Leap 15.0: openssl-1_1 1.1.0i-lp150.3.9.1

openSUSE Leap 15.0: new openssl-1_1 packages (30/07/2018).
New packages are available:
  openSUSE Leap 15.0: openssl-1_1 1.1.0h-lp150.3.3.1

openSUSE Leap 42.3: new compat-openssl098 packages.
New packages are available:
  openSUSE Leap 42.3: compat-openssl098 0.9.8j-24.1

openSUSE Leap 42.3: new nodejs4 packages.
New packages are available:
  openSUSE Leap 42.3: nodejs4 4.9.1-17.1

openSUSE Leap 42.3: new nodejs6 packages.
New packages are available:
  openSUSE Leap 42.3: nodejs6 6.14.4-15.1

openSUSE Leap 42.3: new openssl packages.
New packages are available:
  openSUSE Leap 42.3: openssl 1.0.2j-25.1

Oracle Communications: CPU of April 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2518758.1
  https://support.oracle.com/rs?type=doc&id=2518763.1
  https://support.oracle.com/rs?type=doc&id=2522151.1
  https://support.oracle.com/rs?type=doc&id=2519787.1
  https://support.oracle.com/rs?type=doc&id=2522126.1
  https://support.oracle.com/rs?type=doc&id=2522123.1
  https://support.oracle.com/rs?type=doc&id=2518753.1
  https://support.oracle.com/rs?type=doc&id=2522121.1
  https://support.oracle.com/rs?type=doc&id=2528862.1
  https://support.oracle.com/rs?type=doc&id=2518754.1

Oracle Communications: CPU of January 2019.
A Critical Patch Update is available:
  https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Oracle Communications: CPU of July 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2559239.1
  https://support.oracle.com/rs?type=doc&id=2563691.1
  https://support.oracle.com/rs?type=doc&id=2559240.1
  https://support.oracle.com/rs?type=doc&id=2559722.1
  https://support.oracle.com/rs?type=doc&id=2559225.1
  https://support.oracle.com/rs?type=doc&id=2559721.1
  https://support.oracle.com/rs?type=doc&id=2559256.1
  https://support.oracle.com/rs?type=doc&id=2559242.1
  https://support.oracle.com/rs?type=doc&id=2559243.1
  https://support.oracle.com/rs?type=doc&id=2559648.1

Oracle Fusion Middleware: CPU of January 2019.
A Critical Patch Update is available:
  https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Oracle Fusion Middleware: CPU of Octobre 2018.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2433477.1

Oracle MySQL: version 5.6.43.
The version 5.6.43 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle MySQL: version 5.7.25.
The version 5.7.25 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle MySQL: version 8.0.14.
The version 8.0.14 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle Solaris: CPU of April 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2650589.1

Oracle Solaris: patch for third party software of July 2018 v3.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Oracle VM VirtualBox: version 5.2.20.
The version 5.2.20 is fixed:
  https://www.virtualbox.org/

Palo Alto PAN-OS: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Percona Server for MySQL: version 5.7.25-28.
The version 5.7.25-28 is fixed:
  https://www.percona.com/

Pulse Connect Secure, Pulse Secure Desktop: fixed versions for Multiple Vulnerabilities.
Fixed versions are indicated in information sources.

RHEL 7: new openssl packages.
New packages are available:
  RHEL 7: openssl 1.0.2k-16.el7

Slackware: new openssl packages.
New packages are available:
  Slackware 14.2: openssl 1.0.2p-*-1_slack14.2

SUSE LE 11: new openssl packages.
New packages are available:
  SUSE LE 11 SP4: openssl 0.9.8j-0.106.12.1

SUSE LE 11 SP4: new MozillaFirefox packages (12/12/2019).
New packages are available:
  SUSE LE 11 SP4: MozillaFirefox 68.2.0-78.51.4

SUSE LE 12: new nodejs4 packages.
New packages are available:
  SUSE LE 12 RTM-SP3: nodejs4 4.9.1-15.14.1

SUSE LE 12 RTM: new openssl packages (19/06/2019).
New packages are available:
  SUSE LE 12 RTM: openssl 1.0.1i-27.34.1

SUSE LE 12 SP1: new openssl packages.
New packages are available:
  SUSE LE 12 SP1: openssl 1.0.1i-54.14.1

SUSE LE 12 SP2/3: new openssl packages.
New packages are available:
  SUSE LE 12 SP2: openssl 1.0.2j-60.30.1
  SUSE LE 12 SP3: openssl 1.0.2j-60.30.1

SUSE LE 12 SP3: new compat-openssl098 packages.
New packages are available:
  SUSE LE 12 SP3: compat-openssl098 0.9.8j-106.6.1

SUSE LE 15: new nodejs8 packages.
New packages are available:
  SUSE LE 15 RTM: nodejs8 8.11.4-3.8.2

SUSE LE 15: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_0_0 1.0.2p-3.8.1

SUSE LE 15: new openssl-1_1 packages (01/10/2018).
New packages are available:
  SUSE LE 15 RTM: openssl-1_1 1.1.0i-4.9.2

SUSE LE 15: new openssl-1_1 packages (24/07/2018).
New packages are available:
  SUSE LE 15 RTM: openssl-1_1 1.1.0h-4.3.1, openssl-1_0_0 1.0.2n-3.3.1

Symantec: solution for OpenSSL.
The solution is indicated in information sources.

Synology DSM: version 6.2.2-24922.
The version 6.2.2-24922 is fixed.

Synology DS/RS: version 6.2.2-24922.
The version 6.2.2-24922 is fixed:
  https://www.synology.com/

Tenable Nessus: version 8.0.0.
The version 8.0.0 is fixed:
  https://www.tenable.com/

Ubuntu: new libssl1 packages.
New packages are available:
  Ubuntu 18.04 LTS: libssl1.0.0 1.0.2n-1ubuntu5.1, libssl1.1 1.1.0g-2ubuntu4.1
  Ubuntu 17.10: libssl1.0.0 1.0.2g-1ubuntu13.6
  Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.13
  Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.26
  Ubuntu 12.04 ESM: libssl1.0.0 1.0.1-4ubuntu5.43

X2Go Client for Windows: version 4.1.2.2-2020.02.13.
The version 4.1.2.2-2020.02.13 is fixed:
  http://wiki.x2go.org/doku.php/doc:release-notes-mswin:x2goclient-4.1.2.2

X2Go Client: version 4.1.2.0.
The version 4.1.2.0 is fixed:
  https://wiki.x2go.org/doku.php
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a networks vulnerabilities watch. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.