ALAS-2018-1098

Related Vulnerabilities: CVE-2018-0732  

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack.(CVE-2018-0732 )

ALAS-2018-1098


Amazon Linux AMI Security Advisory: ALAS-2018-1098
Advisory Release Date: 2018-10-30 20:50 Pacific
Advisory Updated Date: 2018-11-01 23:45 Pacific
Severity: Medium
References: CVE-2018-0732 

Issue Overview:

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack.(CVE-2018-0732 )


Affected Packages:

openssl


Issue Correction:
Run yum update openssl to update your system.

New Packages:
i686:
    openssl-perl-1.0.2k-13.111.amzn1.i686
    openssl-devel-1.0.2k-13.111.amzn1.i686
    openssl-debuginfo-1.0.2k-13.111.amzn1.i686
    openssl-1.0.2k-13.111.amzn1.i686
    openssl-static-1.0.2k-13.111.amzn1.i686

src:
    openssl-1.0.2k-13.111.amzn1.src

x86_64:
    openssl-perl-1.0.2k-13.111.amzn1.x86_64
    openssl-1.0.2k-13.111.amzn1.x86_64
    openssl-devel-1.0.2k-13.111.amzn1.x86_64
    openssl-debuginfo-1.0.2k-13.111.amzn1.x86_64
    openssl-static-1.0.2k-13.111.amzn1.x86_64