The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of OpenSSL: man in the middle via ChangeCipherSpec

Synthesis of the vulnerability 

An attacker can act as a man in the middle between a client and a server using OpenSSL, in order to read or alter exchanged data.
Vulnerable products: ArubaOS, ProxyAV, ProxySG par Blue Coat, SGOS by Blue Coat, GAiA, CheckPoint IP Appliance, IPSO, Provider-1, SecurePlatform, CheckPoint Security Appliance, CheckPoint Security Gateway, Cisco ASR, Cisco ATA, Cisco ACE, ASA, AsyncOS, Cisco Catalyst, CiscoWorks, Cisco Content SMA, Cisco CSS, Cisco ESA, IOS by Cisco, IOS XE Cisco, IOS XR Cisco, Cisco IPS, IronPort Email, IronPort Management, IronPort Web, Nexus by Cisco, NX-OS, Prime Collaboration Assurance, Prime Collaboration Manager, Prime Infrastructure, Cisco PRSM, Cisco Router, Secure ACS, Cisco CUCM, Cisco Manager Attendant Console, Cisco Unified CCX, Cisco IP Phone, Cisco MeetingPlace, Cisco Wireless IP Phone, Unity Cisco, WebNS, Cisco WSA, Clearswift Web Gateway, Debian, Avamar, EMC CAVA, EMC CEE, EMC CEPA, Celerra FAST, Celerra NS, Celerra NX4, EMC CMDCE, Connectrix Switch, ECC, NetWorker, PowerPath, Unisphere EMC, VNX Operating Environment, VNX Series, BIG-IP Hardware, TMOS, Fedora, FortiAnalyzer, FortiAnalyzer Virtual Appliance, FortiClient, FortiManager, FortiManager Virtual Appliance, FreeBSD, HP Operations, ProCurve Switch, HP Switch, HP-UX, AIX, Tivoli Storage Manager, WebSphere MQ, Juniper J-Series, Junos OS, Junos Pulse, Juniper Network Connect, Juniper UAC, McAfee Web Gateway, MySQL Enterprise, NetBSD, OpenBSD, OpenSSL, openSUSE, openSUSE Leap, Oracle Communications, Solaris, Polycom CMA, HDX, RealPresence Collaboration Server, Polycom VBP, RHEL, JBoss EAP by Red Hat, ACE Agent, ACE Server, RSA Authentication Agent, RSA Authentication Manager, SecurID, ROS, ROX, RuggedSwitch, SIMATIC, Slackware, Splunk Enterprise, stunnel, SUSE Linux Enterprise Desktop, SLES, Nessus, InterScan Messaging Security Suite, InterScan Web Security Suite, TrendMicro ServerProtect, Ubuntu, ESXi, vCenter Server, VMware vSphere, VMware vSphere Hypervisor, Websense Email Security, Websense Web Filter, Websense Web Security.
Severity of this weakness: 3/4.
Creation date: 05/06/2014.
Revision date: 05/06/2014.
Références of this bulletin: 1676496, 1690827, aid-06062014, c04336637, c04347622, c04363613, CERTFR-2014-AVI-253, CERTFR-2014-AVI-254, CERTFR-2014-AVI-255, CERTFR-2014-AVI-260, CERTFR-2014-AVI-274, CERTFR-2014-AVI-279, CERTFR-2014-AVI-286, CERTFR-2014-AVI-513, cisco-sa-20140605-openssl, cpuoct2016, CTX140876, CVE-2014-0224, DOC-53313, DSA-2950-1, DSA-2950-2, FEDORA-2014-17576, FEDORA-2014-17587, FEDORA-2014-7101, FEDORA-2014-7102, FG-IR-14-018, FreeBSD-SA-14:14.openssl, HPSBHF03052, HPSBUX03046, JSA10629, MDVSA-2014:105, MDVSA-2014:106, MDVSA-2015:062, NetBSD-SA2014-006, openSUSE-SU-2014:0764-1, openSUSE-SU-2014:0765-1, openSUSE-SU-2015:0229-1, openSUSE-SU-2016:0640-1, RHSA-2014:0624-01, RHSA-2014:0625-01, RHSA-2014:0626-01, RHSA-2014:0627-01, RHSA-2014:0628-01, RHSA-2014:0629-01, RHSA-2014:0630-01, RHSA-2014:0631-01, RHSA-2014:0632-01, RHSA-2014:0633-01, RHSA-2014:0679-01, RHSA-2014:0680-01, SA40006, SA80, SB10075, sk101186, SOL15325, SPL-85063, SSA:2014-156-03, SSA-234763, SSRT101590, SUSE-SU-2014:0759-1, SUSE-SU-2014:0759-2, SUSE-SU-2014:0761-1, SUSE-SU-2014:0762-1, SUSE-SU-2019:14246-1, USN-2232-1, USN-2232-2, USN-2232-3, USN-2232-4, VIGILANCE-VUL-14844, VMSA-2014-0006, VMSA-2014-0006.1, VMSA-2014-0006.10, VMSA-2014-0006.11, VMSA-2014-0006.2, VMSA-2014-0006.3, VMSA-2014-0006.4, VMSA-2014-0006.5, VMSA-2014-0006.6, VMSA-2014-0006.7, VMSA-2014-0006.8, VMSA-2014-0006.9, VU#978508.

Description of the vulnerability 

The OpenSSL product implements SSL/TLS, which uses a handshake.

However, by using a handshake with a ChangeCipherSpec message, an attacker can force the usage of weak keys.

An attacker can therefore act as a man in the middle between a client and a server using OpenSSL, in order to read or alter exchanged data.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This weakness impacts software or systems such as ArubaOS, ProxyAV, ProxySG par Blue Coat, SGOS by Blue Coat, GAiA, CheckPoint IP Appliance, IPSO, Provider-1, SecurePlatform, CheckPoint Security Appliance, CheckPoint Security Gateway, Cisco ASR, Cisco ATA, Cisco ACE, ASA, AsyncOS, Cisco Catalyst, CiscoWorks, Cisco Content SMA, Cisco CSS, Cisco ESA, IOS by Cisco, IOS XE Cisco, IOS XR Cisco, Cisco IPS, IronPort Email, IronPort Management, IronPort Web, Nexus by Cisco, NX-OS, Prime Collaboration Assurance, Prime Collaboration Manager, Prime Infrastructure, Cisco PRSM, Cisco Router, Secure ACS, Cisco CUCM, Cisco Manager Attendant Console, Cisco Unified CCX, Cisco IP Phone, Cisco MeetingPlace, Cisco Wireless IP Phone, Unity Cisco, WebNS, Cisco WSA, Clearswift Web Gateway, Debian, Avamar, EMC CAVA, EMC CEE, EMC CEPA, Celerra FAST, Celerra NS, Celerra NX4, EMC CMDCE, Connectrix Switch, ECC, NetWorker, PowerPath, Unisphere EMC, VNX Operating Environment, VNX Series, BIG-IP Hardware, TMOS, Fedora, FortiAnalyzer, FortiAnalyzer Virtual Appliance, FortiClient, FortiManager, FortiManager Virtual Appliance, FreeBSD, HP Operations, ProCurve Switch, HP Switch, HP-UX, AIX, Tivoli Storage Manager, WebSphere MQ, Juniper J-Series, Junos OS, Junos Pulse, Juniper Network Connect, Juniper UAC, McAfee Web Gateway, MySQL Enterprise, NetBSD, OpenBSD, OpenSSL, openSUSE, openSUSE Leap, Oracle Communications, Solaris, Polycom CMA, HDX, RealPresence Collaboration Server, Polycom VBP, RHEL, JBoss EAP by Red Hat, ACE Agent, ACE Server, RSA Authentication Agent, RSA Authentication Manager, SecurID, ROS, ROX, RuggedSwitch, SIMATIC, Slackware, Splunk Enterprise, stunnel, SUSE Linux Enterprise Desktop, SLES, Nessus, InterScan Messaging Security Suite, InterScan Web Security Suite, TrendMicro ServerProtect, Ubuntu, ESXi, vCenter Server, VMware vSphere, VMware vSphere Hypervisor, Websense Email Security, Websense Web Filter, Websense Web Security.

Our Vigil@nce team determined that the severity of this vulnerability announce is important.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this threat bulletin.

Solutions for this threat 

OpenSSL: version 1.0.1h.
The version 1.0.1h is fixed:
  http://www.openssl.org/

OpenSSL: version 1.0.0m.
The version 1.0.0m is fixed:
  http://www.openssl.org/

OpenSSL: version 0.9.8za.
Version 0.9.8za is fixed:
  http://www.openssl.org/

Nessus: version 5.2.7.
The version 5.2.7 is fixed:
  http://www.nessus.org/download

Splunk: version 5.0.9.
The version 5.0.9 is fixed:
  http://www.splunk.com/

Splunk: version 6.0.5.
The version 6.0.5 is fixed:
  http://www.splunk.com/

Splunk: version 6.1.2.
The version 6.1.2 is fixed:
  http://www.splunk.com/

stunnel: version 5.02.
The version 5.02 is fixed:
  https://www.stunnel.org/downloads.html

AIX: patch for OpenSSL.
A patch is available in information sources.

Aruba: solution for OpenSSL.
The solution is indicated in information sources.

Blue Coat: solution for OpenSSL.
The solution is indicated in information sources.

Check Point: solution for OpenSSL ChangeCipherSpec.
The solution is indicated in information sources.

Cisco: solution for OpenSSL.
The solution is indicated in information sources.
Vulnerable products are listed in the information sources.

Clearswift MIMEsweeper Email Appliance: version 3.8.1.
The version 3.8.1 is fixed:
  http://app-patches.clearswift.net/Patches/Patch3_8_1.htm

Clearswift SECURE Web Gateway: version 3.2.1.
The version 3.2.1 is fixed.

Debian: new openssl packages.
New packages are available:
  Debian 7: openssl 1.0.1e-2+deb7u11

EMC: solution for OpenSSL.
The solution is indicated in information sources.

F5 BIG-IP: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Fedora: new mingw-openssl packages.
New packages are available:
  Fedora 20: mingw-openssl 1.0.1j-1.fc20
  Fedora 21: mingw-openssl 1.0.1j-1.fc21

Fedora: new openssl packages.
New packages are available:
  Fedora 19: openssl 1.0.1e-38.fc19
  Fedora 20: openssl 1.0.1e-38.fc20

Fortinet: solution for OpenSSL.
The solution is indicated in information sources.

FreeBSD: patch for openssl.
A patch is available in information sources.

HP Operations Analytics: solution for OpenSSL.
The solution is indicated in the following document:
  http://support.openview.hp.com/selfsolve/document/KM01020441

HP: solution for OpenSSL.
The solution is indicated in information sources.

HP-UX: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

IBM Tivoli Storage Manager: fixed versions.
Fixed versions are indicated in information sources.

Juniper: solution for OpenSSL.
The solution is indicated in information sources.

Mandriva BS2: new openssl packages.
New packages are available:
  Mandriva BS2: openssl 1.0.1m-1.mbs2

Mandriva BS: new openssl packages.
New packages are available:
  Mandriva BS1: openssl 1.0.0m-1.mbs1

Mandriva ES: new openssl packages.
New packages are available:
  Mandriva ES5: openssl 0.9.8h-3.18mdvmes5.2

McAfee Web Gateway: patch for OpenSSL.
A patch is available in information sources.

MySQL Enterprise: version 5.6.20.
The version 5.6.20 is fixed.

NetBSD: patch for OpenSSL.
A patch is available in information sources.

OpenBSD: patch for openssl.
A patch is available in information sources.

openSUSE: new libopenssl0_9_8 packages.
New packages are available:
  openSUSE 13.2: libopenssl0_9_8 0.9.8zh-9.3.1
  openSUSE Leap 42.1: libopenssl0_9_8 0.9.8zh-14.1

openSUSE: new openssl packages.
New packages are available:
  openSUSE 11.4: openssl 1.0.0m-18.53.1
  openSUSE 12.3: openssl 1.0.1h-1.60.1
  openSUSE 13.1: openssl 1.0.1h-11.48.1

openSUSE: new virtualbox packages.
New packages are available:
  openSUSE 13.1: virtualbox 4.2.28-2.25.1
  openSUSE 13.2: virtualbox 4.3.20-7.1

Oracle Communications: CPU of October 2016.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2188694.1

Polycom Converged Management Application: version 5.2.6.
The version 5.2.6 is fixed.

Polycom HDX: version 3.1.5.
The version 3.1.5 is fixed.

Polycom RMX 1800/Collaboration Server: version 8.4.1.
The version 8.4.1 is fixed.

Polycom Video Border Proxy: version 11.2.18.
The version 11.2.18 is fixed.

Red Hat JBoss: solution for OpenSSL.
The solution is indicated in information sources.

Red Hat Storage Server 2.1: new openssl packages.
New packages are available:
  RHEL 6: openssl 1.0.1e-16.el6_5.14

RHEL 5: new openssl097a packages.
New packages are available:
  RHEL 5: openssl097a 0.9.7a-12.el5_10.1

RHEL 5: new openssl packages.
New packages are available:
  RHEL 5: openssl 0.9.8e-27.el5_10.3

RHEL 6.5: new openssl098e packages.
New packages are available:
  RHEL 6: openssl098e 0.9.8e-18.el6_5.2

RHEL 6.5: new openssl packages.
New packages are available:
  RHEL 6: openssl 1.0.1e-16.el6_5.14

RHEL 7.0: new openssl098e packages.
New packages are available:
  RHEL 7: openssl098e 0.9.8e-29.el7_0.2

RHEL 7.0: new openssl packages.
New packages are available:
  RHEL 7: openssl 1.0.1e-34.el7_0.3

RHEL: new openssl packages.
New packages are available:
  RHEL 4: openssl 0.9.7a-43.22.el4
  RHEL 5: openssl 0.9.8e-12.el5_6.12, openssl 0.9.8e-26.el5_9.4
  RHEL 6: openssl 1.0.0-25.el6_3.3, openssl 1.0.0-27.el6_4.4

RHEV Hypervisor for RHEL-6: new rhev-hypervisor6 packages.
New packages are available:
  RHEL 6: rhev-hypervisor6 6.5-20140603.1.el6ev

Siemens: solution for OpenSSL.
The solution is indicated in information sources.

Slackware: new openssl packages.
New packages are available:
  Slackware 13.0: openssl 0.9.8za-i486-1_slack13.0
  Slackware 13.1: openssl 0.9.8za-i486-1_slack13.1
  Slackware 13.37: openssl 0.9.8za-i486-1_slack13.37
  Slackware 14.0: openssl 1.0.1h-i486-1_slack14.0
  Slackware 14.1: openssl 1.0.1h-i486-1_slack14.1

Solaris: patch for OpenSSL.
A patch is available:
Solaris 10 :
  SPARC: 150383-03 148071-13
  X86: 148072-13
Solaris 9 :
  SPARC: 117123-12

Solaris: patch for WAN Boot.
A patch is available:
  Solaris 9 SPARC: 117123-12
  Solaris 10 SPARC: 150383-03

Solaris: version 11.1.20.5.0.
The version 11.1.20.5.0 is fixed:
  https://support.oracle.com/rs?type=doc&id=1683966.1

SUSE LE 10: new openssl packages.
New packages are available:
  SUSE LE 10: openssl 0.9.8a-18.82.4

SUSE LE 11: new openssl packages.
New packages are available:
  SUSE LE 11: openssl 0.9.8j-0.58.1

SUSE LE 11 SP4: new MozillaFirefox packages (12/12/2019).
New packages are available:
  SUSE LE 11 SP4: MozillaFirefox 68.2.0-78.51.4

Trend Micro: solution for OpenSSL ChangeCipherSpec.
The solution is indicated in information sources.

Ubuntu: new libssl packages.
New packages are available:
  Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.4
  Ubuntu 13.10: libssl1.0.0 1.0.1e-3ubuntu1.6
  Ubuntu 12.04 LTS: libssl1.0.0 1.0.1-4ubuntu5.16
  Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.21

VMware: solution for OpenSSL.
The solution is indicated in information sources.

Websense: fixed versions for OpenSSL.
The following versions are fixed:
  Websense Web Security/Web Filter 7.8.2 HF10:
    http://www.websense.com/support/article/kbarticle/v7-8-2-About-Hotfix-10-for-Web-Security-Solutions
  Websense Web Security/Web Filter 7.8.1 HF07:
    http://www.websense.com/support/article/kbarticle/v7-8-1-About-Hotfix-07-for-Web-Security-Solutions

WebSphere MQ: solution for OpenSSL.
The solution is indicated in information sources.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a software vulnerability workaround. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.