One of the high-severity flaws, CVE-2016-2107, allows a man-in-the-middle attacker to initiate a "Padding Oracle Attack" that can decrypt HTTPS traffic if the connection uses AES-CBC cipher and the server supports AES-NI.
Detail here : https://www.openssl.org/news/vulnerabilities.html#y2016
Patch version : 1.0.1t, 1.0.2h
How to patch,
wget https://www.openssl.org/source/openssl-1.0.1t.tar.gz
tar zxvf openssl-1.0.1t.tar.gz
cd openssl-1.0.1t
./config no-ssl2 no-ssl3 --prefix=/opt/openssl
make depend
make test
make install
finally,
/opt/openssl/bin/openssl version
OpenSSL 1.0.1t 3 May 2016
0 comments:
Post a Comment