Bugzilla – Bug 968051
VUL-0: CVE-2016-0703: openssl: Divide-and-conquer session key recovery in SSLv2
Last modified: 2016-04-15 19:10:56 UTC
Divide-and-conquer session key recovery in SSLv2 (CVE-2016-0703) ================================================================ Severity: High This issue only affected versions of OpenSSL prior to March 19th 2015 at which time the code was refactored to address vulnerability CVE-2015-0293. s2_srvr.c did not enforce that clear-key-length is 0 for non-export ciphers. If clear-key bytes are present for these ciphers, they *displace* encrypted-key bytes. This leads to an efficient divide-and-conquer key recovery attack: if an eavesdropper has intercepted an SSLv2 handshake, they can use the server as an oracle to determine the SSLv2 master-key, using only 16 connections to the server and negligible computation. More importantly, this leads to a more efficient version of DROWN that is effective against non-export ciphersuites, and requires no significant computation. This issue affected OpenSSL versions 1.0.2, 1.0.1l, 1.0.0q, 0.9.8ze and all earlier versions. It was fixed in OpenSSL 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf (released March 19th 2015). This issue was reported to OpenSSL on February 10th 2016 by David Adrian and J. Alex Halderman of the University of Michigan. The underlying defect had by then already been fixed by Emilia Käsper of OpenSSL on March 4th 2015. The fix for this issue can be identified by commits ae50d827 (1.0.2a), cd56a08d (1.0.1m), 1a08063 (1.0.0r) and 65c588c (0.9.8zf).
Packages submitted. Reassigning to security team.
SUSE-SU-2016:0617-1: An update that solves 9 vulnerabilities and has two fixes is now available. Category: security (important) Bug References: 952871,958501,963415,968046,968047,968048,968050,968051,968053,968265,968374 CVE References: CVE-2015-3197,CVE-2016-0702,CVE-2016-0703,CVE-2016-0704,CVE-2016-0705,CVE-2016-0797,CVE-2016-0798,CVE-2016-0799,CVE-2016-0800 Sources used: SUSE Linux Enterprise Software Development Kit 12 (src): openssl-1.0.1i-27.13.1 SUSE Linux Enterprise Server 12 (src): openssl-1.0.1i-27.13.1 SUSE Linux Enterprise Desktop 12 (src): openssl-1.0.1i-27.13.1
SUSE-SU-2016:0620-1: An update that solves 9 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 958501,963415,968046,968047,968048,968050,968051,968053,968265,968374 CVE References: CVE-2015-3197,CVE-2016-0702,CVE-2016-0703,CVE-2016-0704,CVE-2016-0705,CVE-2016-0797,CVE-2016-0798,CVE-2016-0799,CVE-2016-0800 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP1 (src): openssl-1.0.1i-44.1 SUSE Linux Enterprise Server 12-SP1 (src): openssl-1.0.1i-44.1 SUSE Linux Enterprise Desktop 12-SP1 (src): openssl-1.0.1i-44.1
SUSE-SU-2016:0621-1: An update that solves 9 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 952871,963415,968046,968047,968048,968050,968051,968053,968265,968374 CVE References: CVE-2015-3197,CVE-2016-0702,CVE-2016-0703,CVE-2016-0704,CVE-2016-0705,CVE-2016-0797,CVE-2016-0798,CVE-2016-0799,CVE-2016-0800 Sources used: SUSE Linux Enterprise Server 11-SECURITY (src): openssl1-1.0.1g-0.40.1
SUSE-SU-2016:0624-1: An update that solves 7 vulnerabilities and has two fixes is now available. Category: security (important) Bug References: 952871,963415,967787,968046,968047,968048,968051,968053,968374 CVE References: CVE-2015-3197,CVE-2016-0702,CVE-2016-0703,CVE-2016-0705,CVE-2016-0797,CVE-2016-0799,CVE-2016-0800 Sources used: SUSE Studio Onsite 1.3 (src): openssl-0.9.8j-0.89.1 SUSE Linux Enterprise Software Development Kit 11-SP4 (src): openssl-0.9.8j-0.89.1 SUSE Linux Enterprise Server 11-SP4 (src): openssl-0.9.8j-0.89.1 SUSE Linux Enterprise Server 11-SP3-LTSS (src): openssl-0.9.8j-0.89.1 SUSE Linux Enterprise Server 11-SP2-LTSS (src): openssl-0.9.8j-0.89.1 SUSE Linux Enterprise Desktop 11-SP4 (src): openssl-0.9.8j-0.89.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): openssl-0.9.8j-0.89.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): openssl-0.9.8j-0.89.1 SUSE Linux Enterprise Debuginfo 11-SP2 (src): openssl-0.9.8j-0.89.1
fixed
openSUSE-SU-2016:0628-1: An update that solves 9 vulnerabilities and has one errata is now available. Category: security (important) Bug References: 958501,963415,968046,968047,968048,968050,968051,968053,968265,968374 CVE References: CVE-2015-3197,CVE-2016-0702,CVE-2016-0703,CVE-2016-0704,CVE-2016-0705,CVE-2016-0797,CVE-2016-0798,CVE-2016-0799,CVE-2016-0800 Sources used: openSUSE Leap 42.1 (src): openssl-1.0.1i-12.1
SUSE-SU-2016:0631-1: An update that fixes 6 vulnerabilities is now available. Category: security (important) Bug References: 963415,968046,968048,968051,968053,968374 CVE References: CVE-2015-3197,CVE-2016-0702,CVE-2016-0703,CVE-2016-0797,CVE-2016-0799,CVE-2016-0800 Sources used: SUSE Linux Enterprise Server for SAP 11-SP4 (src): compat-openssl097g-0.9.7g-146.22.41.1 SUSE Linux Enterprise Desktop 11-SP4 (src): compat-openssl097g-0.9.7g-146.22.41.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): compat-openssl097g-0.9.7g-146.22.41.1
SUSE-SU-2016:0641-1: An update that fixes 7 vulnerabilities is now available. Category: security (important) Bug References: 952871,963415,968046,968048,968051,968053,968374 CVE References: CVE-2015-3197,CVE-2016-0702,CVE-2016-0703,CVE-2016-0704,CVE-2016-0797,CVE-2016-0799,CVE-2016-0800 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): compat-openssl098-0.9.8j-94.1 SUSE Linux Enterprise Module for Legacy Software 12 (src): compat-openssl098-0.9.8j-94.1 SUSE Linux Enterprise Desktop 12-SP1 (src): compat-openssl098-0.9.8j-94.1 SUSE Linux Enterprise Desktop 12 (src): compat-openssl098-0.9.8j-94.1
SUSE-SU-2016:0678-1: An update that fixes 8 vulnerabilities is now available. Category: security (important) Bug References: 937492,957812,963415,968046,968048,968051,968053,968374 CVE References: CVE-2015-0287,CVE-2015-3195,CVE-2015-3197,CVE-2016-0703,CVE-2016-0704,CVE-2016-0797,CVE-2016-0799,CVE-2016-0800 Sources used: SUSE Linux Enterprise Server 10 SP4 LTSS (src): openssl-0.9.8a-18.94.2
openSUSE-SU-2016:0720-1: An update that fixes 7 vulnerabilities is now available. Category: security (important) Bug References: 952871,963415,968046,968048,968051,968053,968374 CVE References: CVE-2015-3197,CVE-2016-0702,CVE-2016-0703,CVE-2016-0704,CVE-2016-0797,CVE-2016-0799,CVE-2016-0800 Sources used: openSUSE Leap 42.1 (src): compat-openssl098-0.9.8j-9.1
SUSE-SU-2016:1057-1: An update that solves 7 vulnerabilities and has two fixes is now available. Category: security (important) Bug References: 952871,963415,967787,968046,968047,968048,968051,968053,968374 CVE References: CVE-2015-3197,CVE-2016-0702,CVE-2016-0703,CVE-2016-0705,CVE-2016-0797,CVE-2016-0799,CVE-2016-0800 Sources used: SUSE OpenStack Cloud 5 (src): openssl-0.9.8j-0.91.1 SUSE Manager Proxy 2.1 (src): openssl-0.9.8j-0.91.1 SUSE Manager 2.1 (src): openssl-0.9.8j-0.91.1