Rapid7 Vulnerability & Exploit Database

OpenSSL TLS 1.1 and 1.2 AES-NI DoS

Back to Search

OpenSSL TLS 1.1 and 1.2 AES-NI DoS

Disclosed
02/05/2013
Created
05/30/2018

Description

The AES-NI implementation of OpenSSL 1.0.1c does not properly compute the length of an encrypted message when used with a TLS version 1.1 or above. This leads to an integer underflow which can cause a DoS. The vulnerable function aesni_cbc_hmac_sha1_cipher is only included in the 64-bit versions of OpenSSL. This module has been tested successfully on Ubuntu 12.04 (64-bit) with the default OpenSSL 1.0.1c package.

Author(s)

  • Wolfgang Ettlinger <wolfgang.ettlinger@gmail.com>

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/dos/ssl/openssl_aesni
msf auxiliary(openssl_aesni) > show actions
    ...actions...
msf auxiliary(openssl_aesni) > set ACTION < action-name >
msf auxiliary(openssl_aesni) > show options
    ...show and set options...
msf auxiliary(openssl_aesni) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;