Short Name |
SSL:OPENSSL-TLS-DOS |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
SSL |
Keywords |
OpenSSL ssl_get_algorithm2 TLS Denial of Service |
Release Date |
2014/03/20 |
Update Number |
2355 |
Supported Platforms |
idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in OpenSSL. The vulnerability is due to an error in ssl_get_algorithms2() where the SSL/TLS version is obtained from an incorrect structure leading to a NULL pointer dereference when computing a message digest. A remote unauthenticated attacker can exploit this vulnerability to cause a denial of service condition on applications that use the vulnerable version of the OpenSSL library.
The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.