SSL: OpenSSL Invalid Session Ticket Denial of Service

A denial-of-service vulnerability exists in OpenSSL. It is due to a memory leak when OpenSSL processes invalid session tickets to verify their integrity. A remote, unauthenticated attacker can send crafted handshake messages to cause memory leaks, exhaust system memory and create a denial of service condition on an application using the vulnerable library.

Extended Description

Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.

Affected Products

Openssl openssl

References

BugTraq: 70586

CVE: CVE-2014-3567

Short Name
SSL:OPENSSL-MEMLEAK-DOS
Severity
Major
Recommended
False
Recommended Action
Drop
Category
SSL
Keywords
CVE-2014-3567 Denial Invalid OpenSSL Service Session Ticket bid:70586 of
Release Date
11/05/2014
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3650
False Positive
Unknown
Vendors

Openssl

CVSS Score

7.1

Found a potential security threat?