DSA-2475-1 openssl -- integer underflow

Related Vulnerabilities: CVE-2012-2333  

It was discovered that openssl did not correctly handle explicit Initialization Vectors for CBC encryption modes, as used in TLS 1.1, 1.2, and DTLS. An incorrect calculation would lead to an integer underflow and incorrect memory access, causing denial of service (application crash.) For the stable distribution (squeeze), this problem has been fixed in version 0.9.8o-4squeeze13. For the testing distribution (wheezy), and the unstable distribution (sid), this problem has been fixed in version 1.0.1c-1. We recommend that you upgrade your openssl packages.

Debian Security Advisory

DSA-2475-1 openssl -- integer underflow

Date Reported:
17 May 2012
Affected Packages:
openssl
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2012-2333.
More information:

It was discovered that openssl did not correctly handle explicit Initialization Vectors for CBC encryption modes, as used in TLS 1.1, 1.2, and DTLS. An incorrect calculation would lead to an integer underflow and incorrect memory access, causing denial of service (application crash.)

For the stable distribution (squeeze), this problem has been fixed in version 0.9.8o-4squeeze13.

For the testing distribution (wheezy), and the unstable distribution (sid), this problem has been fixed in version 1.0.1c-1.

We recommend that you upgrade your openssl packages.