Vulnerability Note VU#484726
OpenSSL does not adequately validate length of Kerberos ticket during SSL/TLS handshake
OpenSSL contains a vulnerability in code that processes SSL/TLS handshakes when configured to use the Kerberos cipher suites. This vulnerability could allow a remote attacker to cause OpenSSL to crash.
OpenSSL implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols and includes a general purpose cryptographic library. SSL and TLS are commonly used to provide authentication, encryption, integrity, and non-repudiation services to network applications such as HTTP, IMAP, POP3, LDAP, and others.
According to RFC2712, TLS allows clients and servers to negotiate cipher suites to meet specific security and administrative policies. In order to provide Kerberos-based authentication, TLS supports the Kerberos cipher suites.
A remote, unauthenticated attacker could cause a denial of service in an application that uses OpenSSL with Kerberos cipher suites.
Upgrade or Patch
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Apple Computer Inc.||Affected||17 Mar 2004||06 May 2005|
|OpenSSL||Affected||-||16 Mar 2004|
|3Com||Unknown||-||18 Mar 2004|
|Alcatel||Unknown||-||18 Mar 2004|
|Apache||Unknown||-||18 Mar 2004|
|At&T||Unknown||-||18 Mar 2004|
|Avaya||Unknown||-||18 Mar 2004|
|Borderware||Unknown||-||18 Mar 2004|
|BSDI||Unknown||-||18 Mar 2004|
|Certicom||Unknown||-||18 Mar 2004|
|Check Point||Unknown||-||18 Mar 2004|
|Cisco Systems Inc.||Unknown||-||18 Mar 2004|
|Clavister||Unknown||-||18 Mar 2004|
|Computer Associates||Unknown||-||18 Mar 2004|
|Conectiva||Unknown||-||18 Mar 2004|
CVSS Metrics (Learn More)
This vulnerability was discovered by the OpenSSL Project and reported by the National Infrastructure Security Co-ordination Centre (NISCC).
This document was written by Damon Morda.
- CVE IDs: CAN-2004-0112
- Date Public: 17 Mar 2004
- Date First Published: 17 Mar 2004
- Date Last Updated: 26 Mar 2004
- Severity Metric: 10.32
- Document Revision: 28
If you have feedback, comments, or additional information about this vulnerability, please send us email.