>OpenSSL has released a security update to address a vulnerability affecting all versions of 1.0.2 and 1.1.1 released before version 1.1.1i. An attacker could exploit this vulnerability to cause a denial-of-service condition.
>EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971) >====================================================== > >Severity: High > >The X.509 GeneralName type is a generic type for representing different types >of names. One of those name types is known as EDIPartyName. OpenSSL provides a >function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME >to see if they are equal or not. This function behaves incorrectly when both >GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash >may occur leading to a possible denial of service attack. > >OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: >1) Comparing CRL distribution point names between an available CRL and a CRL > distribution point embedded in an X509 certificate >2) When verifying that a timestamp response token signer matches the timestamp > authority name (exposed via the API functions TS_RESP_verify_response and > TS_RESP_verify_token) > >If an attacker can control both items being compared then that attacker could >trigger a crash. >...
>1. EXECUTIVE SUMMARY > > CVSS v3 9.8 > ATTENTION: Exploitable remotely/low skill level to exploit > Vendor: Multiple (open source) > Equipment: uIP-Contiki-OS, uIP-Contiki-NG, uIP, open-iscsi, picoTCP-NG, picoTCP, FNET, Nut/Net > Vulnerabilities: Infinite Loop, Integer Wraparound, Out-of-bounds Read, Integer Overflow, Out-of-bounds Write, Improper Input Validation, Improper Null Termination > >CISA is aware of a public report, known as “AMNESIA:33” that details vulnerabilities found in multiple open-source TCP/IP stacks. CISA is issuing this advisory to provide early notice of the reported vulnerabilities and identify baseline mitigations for reducing risks to these and other cybersecurity attacks. > >The various open-source stacks may be implemented in forked repositories. >2. RISK EVALUATION > >Successful exploitation of these vulnerabilities could allow attackers to corrupt memory, put devices into infinite loops, access unauthorized data, and/or poison DNS cache. >3. TECHNICAL DETAILS >3.1 AFFECTED PRODUCTS > >The following are affected: > > uIP-Contiki-OS (end-of-life [EOL]), Version 3.0 and prior > uIP-Contiki-NG, Version 4.5 and prior > uIP (EOL), Version 1.0 and prior > open-iscsi, Version 2.1.12 and prior > picoTCP-NG, Version 1.7.0 and prior > picoTCP (EOL), Version 1.7.0 and prior > FNET, Version 4.6.3 > Nut/Net, Version 5.1 and prior >... #Security
> Security researchers are alarmed: the already-notorious Trickbot malware has been spottied probing infected computers to find out which version of UEFI they're running. This is read as evidence that Trickbot has figured out how to pull off a really scary feat.
#BleepingComputer is an anti- #gnu#linux site. Whenever it mentions "LINUX" it's an attack (a #security FUD angle usually), now #microsoft EEE against it! "How to run Linux programs from a Windows 10 command prompt"