Malware bug

OpenSSL warns of another high severity flaw

Pro
(Source: Stockfresh)

8 July 2015

Server administrators and developers beware: the OpenSSL Project plans to release security updates Thursday, 9 July for its widely used cryptographic library that will fix a high severity vulnerability.

OpenSSL implements multiple cryptographic protocols and algorithms including Transport Layer Security (TLS), which underpins encryption on the Web as part of protocols such as HTTP Secure (HTTPS), Internet Message Access Protocol Secure (IMAPS) and Simple Mail Transfer Protocol Secure (SMTPS).

The project did not say which part of the library is affected, but high severity flaws in OpenSSL are usually a big deal, especially if they impact TLS.

OpenSSL is used by a large number of applications and systems, from Web servers to embedded devices, some of which can take a long time to patch.

Months after the critical Heartbleed vulnerability was announced in OpenSSL last year, hardware and software vendors were still identifying affected products and were releasing updates.

According to the OpenSSL Project’s security policy, the flaws that are flagged as high severity affect common configurations and are likely to be exploitable. Their impact includes things like server denial-of-service, significant leak of server memory or remote code execution.

The issue to be patched Thursday affects the 1.0.1 and 1.0.2 versions of OpenSSL. These are the library’s releases that support TLS v1.1 and TLS v1.2, the newest versions of the protocol. The patched versions will be called 1.0.1p and 1.0.2d.

OpenSSL 0.9.8 and 1.0.0, which the project will still support until the end of this year, are not affected.

 

Lucian Constantin, IDG News Service

Read More:


Back to Top ↑

TechCentral.ie