OpenSSL CRYPTO_free_all_ex_data()内存泄露漏洞

受影响系统:

OpenSSL Project OpenSSL 1.0.0 Beta – Beta 4
OpenSSL Project OpenSSL 0.9.8l

描述:


CVE ID: CVE-2009-4355

OpenSSL是一种开放源码的SSL实现,用来实现网络通信的高强度加密,现在被广泛地用于各种网络应用程序中。

OpenSSL的crypto/comp/c_zlib.c文件中的zlib_stateful_finish函数存在内存泄露漏洞,远程攻击者可以通过启用了PHP模块的Apache等应用触发对CRYPTO_free_all_ex_data函数的错误调用,导致耗尽可用的内存。漏洞起因是curl,可通过php模块调用:

void Curl_ossl_cleanup(void)
{
/* Free the SSL error strings */
ERR_free_strings();

/* EVP_cleanup() removes all ciphers and digests from the
    table. */
EVP_cleanup();

#ifdef HAVE_ENGINE_cleanup
ENGINE_cleanup();
#endif

#ifdef HAVE_CRYPTO_CLEANUP_ALL_EX_DATA
/* this function was not present in 0.9.6b, but was added sometimes
    later */
CRYPTO_cleanup_all_ex_data();
#endif
}

<*来源:Michael K Johnson
  
  链接:http://secunia.com/advisories/38200/
        https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=546707
        https://issues.rpath.com/si/jira.issueviews:issue-html/RPL-3157/RPL-3157.html
*>

建议:


厂商补丁:

OpenSSL Project
—————
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://cvs.openssl.org/chngview?cn=19069
http://cvs.openssl.org/chngview?cn=19068

发表评论?

0 条评论。

发表评论