OpenSSL, a popular secure communication library is found to have a bug that can put the service into an infinite loop of DoS.
Researchers said the bug is regarding a parsing issue within certain versions of OpenSSL and needs a maliciously crafted certificate for triggering it. Once done, it puts the SSL connection in a loop of me a denial of service. OpenSSL team has released patches for this issue and recommends users apply.
OpenSSL Parsing Bug Causing DoS
Denial of Service (DoS) is something that causes a legitimate service to crash due to malicious acts pushed by threat actors, with an aim of blocking the service even for legitimate users. Though this may not pose a huge cybersecurity risk, it can cost a long-term financial loss and dent the brand’s reputation.
And this is what OpenSSL users may face if they don’t patch a bug spotted recently. Found by Tavis Ormandy, a Google security researcher, the certificate parsing vulnerability in OpenSSL can cause a significant impact to all the businesses using it.
This was a fun one to work on, @davidben__ helped track it down to a bug in the Tonelli-Shanks implementation in OpenSSL. https://t.co/AYvpBLwNvJ — Tavis Ormandy (@taviso) March 15, 2022