Just two months after the Heartbleed Bug scare, the open-source group for OpenSSL today warned of a new set of vulnerabilities discovered in the protocol that could let an attacker carry out man-in-the-middle and buffer-overflows attacks or otherwise compromise data integrity. Some security experts said these new vulnerabilities shouldn’t be discounted but don’t appear as serious as Heartbleed. The OpenSSL Group today detailed a half dozen basic problems that require patching in various versions of OpenSSL-based servers and clients that use the protocol for encryption. The SANS Institute, in a webcast by director Johannes Ullrich in the SANS division known as the Internet Storm Center, quickly moved to put perspective on the OpenSSL advisory to its online audience of security practitioners. + ALSO ON NETWORK WORLD Core Infrastructure Initiative to delve into security of OpenSSL, OpenSSH, Network Time Protocol + “What you should tell management is this isn’t as bad as Heartbleed,” said Ullrich. Although the new vulnerabilities in OpenSSL may not necessarily need to be patched today, they should be addressed in the next few days as vendors make it known if their products are impacted, Ullrich said. The OpenSSL advisory pointed to potential man-in-the-middle attacks related to a “DTLS recursion flaw” and “DTLS invalid fragment vulnerability,” which only impact SSL used over the sessionless protocol UDP. This only affects SSL over UDP protocols that uses DTLS, Ullrich said, which could mean some types of VPNs, VoIP, or WebRTC. Both the server and the client have to be vulnerable for an attacker to take advantage of these flaws. Ullrich said the vulnerability that troubled him most is the buffer overflow attack possibility in the DTLS invalid fragment vulnerability, though there were no known exploits at the moment. He said more information is needed about this. There are also two denial-of-service vulnerabilities in some versions of OpenSSL, plus another issue identified as “Anonymous ECDH DoS vulnerability” in which enabling of elliptic-curve ECDH cipherssuites are subject to a denial-of-service attack. Ullrich said Anonymous ECDH should be disabled in any event. In summarizing how to start on addressing this new batch of OpenSSL issues, Ullrich advised security managers to take what they learned during the Heartbleed Bug episode and apply it. That means identifying what users have in terms of OpenSSL implementations to determine what software is specifically vulnerable. There should also be monitoring for server crashes. However, it’s not realistic to think about abandoning use of SSL since it’s a “critical technology” used to protect data, he said. Ullrich noted that this time, the OpenSSL project did provide some advance notice for large ISPs and software providers about the new OpenSSL vulnerabilities so they wouldn’t be caught off guard, as happened with the Heartbleed Bug. Some security vendors are also weighing in on the advisory. Jean Taggart, security researcher at malwarebytes, said, “We shouldn’t be surprised that there are more flaws in the OpenSSL cryptographic library. Most notable is that the flaws discovered again do not affect the cryptographic methods used, but their implementation. The flaw is certainly less severe than Heartbleed, as a malicious actor must be in control of one of the nodes in between the intended victim and its destination, hence the man-in-the-middle references. This flaw enables forcing TLS (the transport layer security) to dumb down the encryption used to secure the flow of information to unsafe levels, where it can be decrypted, read and even possibly modified. It’s often said that security is a process, not a product. The independent code review, subsequent bug discovery and patching process is the strength of open source.” Related content news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Industry Networking news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Network Security Networking news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center news AWS and Nvidia partner on Project Ceiba, a GPU-powered AI supercomputer The companies are extending their AI partnership, and one key initiative is a supercomputer that will be integrated with AWS services and used by Nvidia’s own R&D teams. By Andy Patrizio Nov 30, 2023 3 mins CPUs and Processors Generative AI Supercomputers Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe