Flaws patched in OpenSSL internet sockets protocol

Routine security testing by a British government agency uncovered three security vulnerabilities recently that could have allowed...

Routine security testing by a British government agency uncovered three security vulnerabilities recently that could have allowed hackers to disrupt an open source version of the Secure Sockets Layer (SSL) internet protocol.

The flaws were found in the OpenSSL Project's Version 0.9.6j of its SSL software by the National Infrastructure Security Co-ordination Centre, a government agency that aims to protect critical national services from electronic attacks, said Mark Cox, a member of the OpenSSL development team. 

Workers with the NISCC found that sending certain malformed data to OpenSSL could crash it. 

OpenSSL volunteers then did their own testing and found three related flaws that allowed the problem to occur, including two flaws that could allow OpenSSL to crash and another that could potentially be exploitable by a skilled hacker. 

"We're erring on the side of caution and saying it was maybe exploitable," Cox said. 

OpenSSL is a library of cyptographic routines and algorithms used by programs to accept information on the internet, Cox said. Most secure web servers running the Apache web server use the OpenSSL protocol. 

The problem was discovered last month by NISCC and reported to OpenSSL volunteers, who posted a patched version of the software on the OpenSSL website.

Users of OpenSSL can also get the updates from their software vendors, including Red Hat, SUSE Linux and MandrakeSoft.

Todd R Weiss writes for Computerworld




Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...