Two vulnerabilities have been reported in OpenSSL 0.9.8 and later that can lead to a Denial of Service in DTLS-enabled daemons: CVE-2009-1377 epoch record buffer memory DoS http://rt.openssl.org/Ticket/Display.html?id=1930&user=guest&pass=guest http://marc.info/?l=openssl-dev&m=124247675613888&w=2 http://cvs.openssl.org/chngview?cn=18187 CVE-2009-1378 DTLS fragment handling memory DoS http://rt.openssl.org/Ticket/Display.html?id=1931&user=guest&pass=guest http://marc.info/?t=124250665500033&r=1&w=2 http://cvs.openssl.org/chngview?cn=18188
Created attachment 191674 [details, diff] openssl-0.9.8-CVE-2009-1377.patch openssl-0.9.8-CVE-2009-1377.patch as applied in CVS.
Created attachment 191677 [details, diff] openssl-0.9.8-CVE-2009-1378.patch openssl-0.9.8-CVE-2009-1378.patch backport as proposed in the bug report.
http://thread.gmane.org/gmane.comp.security.oss.general/1769/focus=1772
CVE-2009-1377 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1377): The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug." CVE-2009-1378 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1378): Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."
CVE-2009-1379: Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.
Created attachment 192323 [details, diff] openssl-0.9.8-CVE-2009-1379.patch Patch for CVE-2009-1379 as applied to CVS.
CVE-2009-1387 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1387): The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
Patch at: http://rt.openssl.org/Ticket/Display.html?id=1838&user=guest&pass=guest
ive added 0.9.8l with the patches for 137{7,8,9}, and 1387 seems to already be included
Stabilization via bug 292022.
CVE-2009-1387 wasnt in the 0.9.8l release, so i added it to 0.9.8l-r1
GLSA 200912-01