[sssForm]

Security Advisory

TLS/SSL - CVE-2016-8610
Published: July 25, 2017
Last Update: July 25, 2017
Summary

A Denial-of-Service (DoS) flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. Accordingly, the following vulnerabilities are addressed in this document that may affect the TLS/SSL data-plane of ACOS devices.

Item Score
# Vulnerability ID Source Score Summary
1 CVE-2016-8610 RedHat Medium SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS [1, 2, 3]
Affected Releases

The table below indicates releases of ACOS exposed to these vulnerabilities and ACOS releases that address these issues or are otherwise unaffected by them.

Customers using affected ACOS releases can overcome vulnerability exposures by updating to the indicated resolved release. If the table does not list a corresponding resolved or unaffected release, then no ACOS release update is currently available.

Releases Affected Releases Resolved or Unaffected
4.1.1 4.1.1-P1
4.1.0 – 4.1.0-P7 4.1.0-P8
2.7.2 – 2.7.2-P9 2.7.2-P10
2.7.1-GR1 – 2.7.1-GR1-P2 2.7.1-GR1-P3
2.6.1-GR1 – 2.6.1-GR1-P16 2.7.1-GR1-P3, 2.7.2-P10, 4.1.0-P8, 4.1.1-P1
Workarounds and Mitigations

Exposure to this vulnerability can be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject this type of alert packets.

Software Updates

Software updates that address these vulnerabilities are or will be published at the following URL:
http://www.a10networks.com/support/axseries/

Vulnerability Details

The following table shares brief descriptions for the vulnerabilities addressed in this document.

Vulnerability ID Description
CVE-2016-8610 A flaw was found in the way OpenSSL processed ALERT packets during an SSL handshake. A attacker basically sends a large number of plaintext WARNING pkgs after CLIENTHELLO, which causes OpenSSL to go into a endless loop (while the attacker keeps on sending more alert packets), consequently taking 100% CPU. This may cause certain applications compiled against OpenSSL to hang and may not be able to serve content to the clients. This is specifically true about for servers which do not for or allocate extra thread for the processing of ClientHello like nginx.
Vulnerability ID Vulnerability Description
Acknowledgements
Modification History
Revision Date Description
1.0 April 18, 2018

Created web page