Fixes are in for OpenSSL
The group behind the widely used Web security software releases a patch for two flaws that could allow someone to launch a denial-of-service attack.
The flaws affect more than Linux systems that have the software installed. They could also hobble many routers
![]() | ||||
![]() | ![]() | ![]() | ||
![]() | ![]() Get Up to Speed on... Enterprise security ![]() Get the latest headlines and company-specific news in our expanded GUTS section. ![]() | ![]() | ||
![]() | ||||
![]() |
OpenSSL is an open implementation of Secure Sockets Layer (SSL) encryption, which is used by almost all Web browsers as a way to secure data that travels over the public Internet. The software also forms the basis of a popular component of the Apache Web server, which accounts for more than two-thirds of the servers on the Internet.
The flaws don't give an attacker the opportunity to take control of a computer or a device, but they do create the possibility for specially crafted data to crash the software. Such a denial-of-service attack could stop users
![]() | ||||
![]() | ![]() | ![]() | ||
![]() | ![]() Get Up to Speed on... Open source ![]() Get the latest headlines and company-specific news in our expanded GUTS section. ![]() | ![]() | ||
![]() | ||||
![]() |
A survey conducted last November found that nearly half of the Web servers involved in the study ran a version of OpenSSL that hadn't been recently patched. A flaw in the Web server component based of OpenSSL was responsible for allowing the Linux Slapper worm to spread in September 2002.
Red Hat and Novell's SuSE Linux subsidiary both ship Linux systems that incorporate OpenSSL.