Site icon TechNewsBoy.com

Serious OpenSSL vulnerability puts Intel-powered systems at risk

OpenSSL v3.0.4, the latest version of the open-source library for applications that secure communications, seems to be carrying a high-severity bug that could allow exploiters to run malicious code, remotely.

The problem is – there’s no proof of concept, which means it still can’t be considered a fully-fledged vulnerability, and the question remains whether it ever will.

Reports claim this version of OpenSSL carries a memory corruption vulnerability on CPUs with the AVX512 extension (Advanced Vector Extensions 512). The version was released in an attempt to fix an earlier command-injection vulnerability (CVE-2022-2068) which, itself, wasn’t able to fix an even earlier issue – CVE-2022-1292. 

High-severity vulnerability, or not?

On GitHub, the explanation is that when ossl_rsaz_mod_exp_avx512_x2(), makes a call off to bn_reduce_once_in_place(), the call includes the value factor_size, which is supposed to be the number of words to process.

However, the old code was sending bit size, which sometimes could result in heap buffer overflow. As the problem can be created via a TLS handshake, remote endpoint abuse is a possibility.

While some researchers believe this warrants a 10/10 severity score, not everyone agrees. 

According to security researcher Guido Vranken (opens in new tab), this version “is susceptible to remote memory corruption which can be triggered trivially by an attacker.”  

Vranken did add that the 1.1.1 tree of the library is still being used, rather than v3 tree, and that libssl was forked into LibreSSL and BoringSSL, which could complicate things for potential attackers.

Furthermore, the flaw only affects x64 chips with AVX512, making the attack surface that much smaller. 

On the other hand, Tomáš Mráz, software developer at the OpenSSL Foundation, doesn’t think this flaw constitutes a security vulnerability. 

“I do not think this is a security vulnerability,” he said. “It is just a serious bug making [the] 3.0.4 release unusable on AVX512 capable machines.”

The flaw has since been fixed, according to The Register, even though OpenSSL 3.0.5 hasn’t been released just yet. 

  • Keep your digital premises secure with the best antivirus programs around 

Via: The Register (opens in new tab)

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! TechNewsBoy.com is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – abuse@technewsboy.com. The content will be deleted within 24 hours.
Exit mobile version