{"id":22913,"date":"2015-07-27T12:10:21","date_gmt":"2015-07-27T06:40:21","guid":{"rendered":"http:\/\/www.tothenew.com\/blog\/?p=22913"},"modified":"2015-12-14T12:15:45","modified_gmt":"2015-12-14T06:45:45","slug":"openssl-vulnerability-cve-2015-1793-and-remediation","status":"publish","type":"post","link":"https:\/\/www.tothenew.com\/blog\/openssl-vulnerability-cve-2015-1793-and-remediation\/","title":{"rendered":"OpenSSL Vulnerability (CVE-2015-1793) and Remediation"},"content":{"rendered":"<p>A high-severity vulnerability was announced by OpenSSL. This vulnerability is marked as CVE-2015-1793. Common Vulnerabilities and Exposures is a system that provides a reference-method for publicly known security vulnerabilities and exposures. This blog explains <strong>OpenSSL Vulnerability (CVE-2015-1793) and Remediation<\/strong>.<br \/>\nOpenSSL Team released following statement regarding this vulnerability:<\/p>\n<blockquote><p><em>The OpenSSL project team would like to announce the release of OpenSSL versions 1.0.2d and 1.0.2p. These releases will be made available on 9th July. They will fix a single security defect classified as &#8220;high severity&#8221;. This defect does not affect the 1.0.0 or 0.9.8 releases.<\/em><\/p><\/blockquote>\n<p>Source: www.openssl.org<\/p>\n<h3 style=\"text-align: justify;color: #ff9900\"><span style=\"color: #ff9900\">What this vulnerability can do?<\/span><\/h3>\n<p>It allows a user to exploit the certificate verification process in OpenSSL, allowing him\/her to pretend to be another user or website.This vulnerability is a certificate verification flaw. The attacker can lure or misdirect users to a malicious website (or any internet service using TLS\/SSL) and will be able to trick a user into assuming that he\/she is somewhere legitimate and secure. The working of TLS\/SSL relies on a &#8220;chain of trust&#8221; formed by certificates. The chain of certificates reassures the web browser that the website user is visiting really does belong to the organisation he\/she expects.<br \/>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-23709\" src=\"\/blog\/wp-ttn-blog\/uploads\/2015\/07\/cert.png\" alt=\"cert\" width=\"316\" height=\"465\" \/><\/p>\n<p style=\"text-align: justify;color: #0000ff\">The screenshot shows that we have visited google.com and it has a certificate that is verified by Google Internet Authority G2.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-23711\" src=\"\/blog\/wp-ttn-blog\/uploads\/2015\/07\/cert-details.png\" alt=\"cert details\" width=\"533\" height=\"627\" \/><\/p>\n<p style=\"text-align: justify;color: #0000ff\">By selecting the &#8220;Certificate Information&#8221;, we can see more details like organization name, an expiry of the certificate and much more.<\/p>\n<h3 style=\"text-align: justify;color: #ff9900\"><span style=\"color: #ff9900\">What effect does this vulnerability have on NGINX?<\/span><\/h3>\n<p>If we are using a configured client certificate verification in NGINX, then NGINX will use the certificate verification process in OpenSSL. This process matches a client or server certificate against a set of trusted root certificates that we provide.<br \/>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-23712\" src=\"\/blog\/wp-ttn-blog\/uploads\/2015\/07\/EXCEPTION.png\" alt=\"EXCEPTION\" width=\"430\" height=\"335\" \/><br \/>\nIdeally, the browser should have shown a warning as in the picture above, if the certificate is either forged or not signed by any trusted root authority.<br \/>\nBut due to this vulnerability, an attacker can make the browser to trust the certificate even if it is not signed by any trusted root authority. This will result into an attacker potentially pretending to be another user or server.<\/p>\n<h3 style=\"text-align: justify;color: #ff9900\"><span style=\"color: #ff9900\">What is the possibility of this vulnerability affecting our setup?<\/span><\/h3>\n<p>If we are using a vulnerable version of OpenSSL, then we should upgrade the OpenSSL installation.<br \/>\nThe version of OpenSSL used by NGINX installation can be checked as follows:<\/p>\n<p>[js]<br \/>\nnginx -V<br \/>\n[\/js]<\/p>\n<p>In the &#8220;running with OpenSSL&#8221; statement; if it shows version as 1.0.2c, 1.0.2b, 1.0.1n or 1.0.1o (vulnerable versions). We will need to upgrade.<\/p>\n<h3 style=\"text-align: justify;color: #ff9900\"><span style=\"color: #ff9900\">Upgrading OpenSSL<\/span><\/h3>\n<p>NGINX uses the version of OpenSSL that comes with the operating system. We need to follow OS\u2019s instructions to update it. In our case we have ubuntu server, so we will download the package from the following <a title=\"link\" href=\"http:\/\/people.canonical.com\/~ubuntu-security\/cve\/2015\/CVE-2015-1793.html\" target=\"_blank\">link<\/a>.<\/p>\n<p style=\"text-align: justify;color: #0000ff\">*The vulnerability status of operating systems other than Ubuntu are:<\/p>\n<p>Source: www.nginx.com<\/p>\n<p>CentOS \u2013 Not affected<br \/>\n<a title=\"Debian\" href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2015-1793\" target=\"_blank\">Debian<\/a> is affected<br \/>\n<a title=\"FreeBSD\" href=\"https:\/\/www.freebsd.org\/security\/advisories\/FreeBSD-SA-15:12.openssl.asc\" target=\"_blank\">FreeBSD<\/a> is affected<br \/>\nOracle Linux \u2013 Not affected<br \/>\nRedHat \u2013 Not affected<br \/>\nSuSE \u2013 Not affected<\/p>\n<p>Once we are done with upgrading the OpenSSL library, we will have to restart NGINX.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A high-severity vulnerability was announced by OpenSSL. This vulnerability is marked as CVE-2015-1793. Common Vulnerabilities and Exposures is a system that provides a reference-method for publicly known security vulnerabilities and exposures. This blog explains OpenSSL Vulnerability (CVE-2015-1793) and Remediation. OpenSSL Team released following statement regarding this vulnerability: The OpenSSL project team would like to announce [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":5},"categories":[2026,1],"tags":[2020,2042,2022,227,2023,1336,2019,2021],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/22913"}],"collection":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/comments?post=22913"}],"version-history":[{"count":0,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/22913\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/media?parent=22913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/categories?post=22913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/tags?post=22913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}