SSL: OpenSSL ECDH Use After Free

This signature detects attempts to exploit a known vulnerability against OpenSSL. The vulnerability is due to an error in processing handshake messages arriving in incorrect order by ephemeral ECDH ciphersuites. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted TLS handshake sequence. A successful attack would result in the execution of arbitrary attacker code in the context of the affected application. If the attack fails, the application may terminate abnormally, resulting in a denial-of-service condition. Applications using OpenSSL may be affected by this vulnerability if the version of OpenSSL they use supports ephemeral ECDH ciphersuites and if these ciphersuites are enabled in the application configuration.

Extended Description

OpenSSL is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. OpenSSL 0.9.8 through 0.9.8e and OpenSSL 1.0.0 through 1.0.0d are vulnerable.

Affected Products

Avaya 96x1_ip_deskphone,Openssl_project openssl

References

BugTraq: 49471

CVE: CVE-2011-3210

Short Name
SSL:OPENSSL-ECDH-UAF
Severity
Major
Recommended
False
Recommended Action
None
Category
SSL
Keywords
After CVE-2011-3210 ECDH Free OpenSSL Use bid:49471
Release Date
05/05/2014
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Hp

Avaya

Ubuntu

Mandriva

Kolab

Openssl_project

CVSS Score

5.0

Found a potential security threat?