===================================================================== CERT-Renater Note d'Information No. 2003/VULN105 _____________________________________________________________________ DATE : 21/03/2003 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Systems running implementations of SSL/TLS ====================================================================== Researchers have discovered an extension of the "Bleichenbacher attack" on RSA with PKCS #1 v1.5 padding. The attack affects TLS 1.0 (aka SSL 3.0) but does *not* affect OpenSSH. Exploitation requires that an attacker open millions of TLS connections to the machine being attacked. Users who run services utilizing TLS and RSA encryption should update their OpenSSL to the version now in OpenBSD-current and the 3.1 and 3.2 -stable branches or use one of the patches below. Patch for OpenBSD 3.1: ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/025_kpr.patch Patch for OpenBSD 3.2: ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/012_kpr.patch The OpenSSL advisory (from which the patches are derived) is: http://www.openssl.org/news/secadv_20030319.txt The following paper describes the attack in detail: http://eprint.iacr.org/2003/052/ ====================================================================== ========================================================= Les serveurs de référence du CERT-Renater http://www.urec.fr/securite http://www.cru.fr/securite http://www.renater.fr ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 151 bd de l'Hopital | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================