Amazon Linux 1 Security Advisory: ALAS-2014-429
Advisory Release Date: 2014-10-16 22:14 Pacific
Advisory Updated Date: 2014-10-16 22:21 Pacific
A flaw was found in the way SSL 3.0 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections.
Affected Packages:
nss
Issue Correction:
Run yum update nss to update your system.
i686:
nss-3.16.2-7.57.amzn1.i686
nss-sysinit-3.16.2-7.57.amzn1.i686
nss-devel-3.16.2-7.57.amzn1.i686
nss-tools-3.16.2-7.57.amzn1.i686
nss-debuginfo-3.16.2-7.57.amzn1.i686
nss-pkcs11-devel-3.16.2-7.57.amzn1.i686
src:
nss-3.16.2-7.57.amzn1.src
x86_64:
nss-3.16.2-7.57.amzn1.x86_64
nss-tools-3.16.2-7.57.amzn1.x86_64
nss-debuginfo-3.16.2-7.57.amzn1.x86_64
nss-devel-3.16.2-7.57.amzn1.x86_64
nss-pkcs11-devel-3.16.2-7.57.amzn1.x86_64
nss-sysinit-3.16.2-7.57.amzn1.x86_64