-
Notifications
You must be signed in to change notification settings - Fork 143
Bump to 0.9.8za (CVE-2014-0224 and friends) #86
Conversation
Meterpreter's build scripts dynamically pull in OpenSSL from the canonical remote site, https://openssl.org. This ensures that we pull in 0.9.8za, which is patched against the various OpenSSL vulns described at https://www.openssl.org/news/secadv_20140605.txt The SHA1sum should be: adca1eb1a103a5536b24e1ed7e45051e2939731 openssl-0.9.8za.tar.gz The MD5sum should be: 2f989915f8fea49aa1bc37aa58500cce openssl-0.9.8za.tar.gz
Note that I haven't built this yet, I put in the PR to kick off the automated build. Please do not trust this yet. |
Test PASSED. |
Reinstalling a build environment so I can compile these:
It's taking a little more time than I was expecting. Protip: don't store your build environment VM on an external drive that's not okay with file sizes > 4 gigs. You will no longer be able to snapshot/restore. :/ |
Test PASSED. |
Added a Redmine bug for this. https://dev.metasploit.com/redmine/issues/8808 When landing this PR, please reference this bug with |
Added a Landing section for this PR's description. |
Test PASSED. |
Why does this include OpenSSL headers? Shouldn't those be in the downloaded package? |
The Posix build downloads them, but the Windows build does not. |
I've kicked off an internal build to pick up the binaries for testing. |
Current binaries as of commit c41bd249569874db1786d3a8ac93549bacea897e Note that rapid7/meterpreter#86 should be landed as well. SeeRM rapid7#8808
For what it's worth, I've given this a spin and it's fine for me too (sorry for the delay). |
Some of Meterpreter's build scripts dynamically pull in OpenSSL from the canonical remote site, https://openssl.org. Some do not (notably, Windows).
This ensures that we pull in 0.9.8za, which is patched against the various OpenSSL vulns described at
https://www.openssl.org/news/secadv_20140605.txt
The SHA1sum should be:
adca1eb1a103a5536b24e1ed7e45051e2939731 openssl-0.9.8za.tar.gz
The MD5sum should be:
2f989915f8fea49aa1bc37aa58500cce openssl-0.9.8za.tar.gz
Verification
Binary Verification
Once you have some binaries in hand, you should verify:
Landing
When this is landed, the gem should be updated at rapid7/meterpreter_bins. Another PR will be opened for that.
Redmine issue 8808 is tracking this, as well. See: https://dev.metasploit.com/redmine/issues/8808
Since we do not currently use the Meterpreter gem (coming soon though!), the generated binaries need to be copied over to the rapid7/metasploit-framework repo. Another PR will be opened there once binaries are generated for Posix and Windows.