[nycbug-talk] what is the threat of the openssl advisory?
    George Georgalis 
    george at galis.org
       
    Thu Sep 28 19:22:13 EDT 2006
    
    
  
There was an openssl advisory today
http://www.openssl.org/news/secadv_20060928.txt
http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc
my primary concern is
 A buffer overflow was discovered in the SSL_get_shared_ciphers()
 utility function.  An attacker could send a list of ciphers to an
 application that uses this function and overrun a buffer
 (CVE-2006-3738).
there is no comment on if an exploit is known to exist or how
difficult (or easy) it would be to create one based on the patch.
http://security.freebsd.org/patches/SA-06:23/
In fact the netbsd openssl looks pretty different than freebsd
in the context of applying the patch. Can we determine a level
of risk?  Are all ssl, openvpn, ssh, https, etc servers needing
access restricted to friendly IPs or is the threat just one bit
inside "astronomically possible?" -- I cannot tell.
// George
-- 
George Georgalis, systems architect, administrator <IXOYE><
    
    
More information about the talk
mailing list