Libcrypto-3-x64.dll Download

0 views
Skip to first unread message

Joseph

unread,
Aug 5, 2024, 10:04:52 AM8/5/24
to giacalithe
Iconnected openssl to my project and it compiles and runs well, but next to the program after compiling there is a file libcrypto-3-x64.dll, without which the program will not run, so the question is how do I use openssl without this dll how to integrate it into the project?

I compiled the library according to this guide x64 static and still errors like this "unresolved external symbol __imp_WSAGetLastError" "unresolved external symbol __imp_CertOpenStore.".


Errors related to libcrypto-3-x64.dll can arise for a few different different reasons. For instance, a faulty application, libcrypto-3-x64.dll has been deleted or misplaced, corrupted by malicious software present on your PC or a damaged Windows registry.


In the vast majority of cases, the solution is to properly reinstall libcrypto-3-x64.dll on your PC, to the Windows system folder. Alternatively, some programs, notably PC games, require that the DLL file is placed in the game/application installation folder.


Do you have information that we do not?

Did our advice help or did we miss something?

Our Forum is where you can get help from both qualified tech specialists and the community at large. Sign up, post your questions, and get updates straight to your inbox.


We have multiple devices showing up with OpenSSL vulnerabilities. It is detecting two dll files that it is flagging. Which they are libssl-3-x64.dll and libcrypto-3-x64.dll. It is flagging this for multiple different applications through out multiple devices. Some devices it's not the same application. Is defender showing a false negative of these vulnerabilities. If this are not false negatives then what is the process to update the dll files inside the applications?


Could you help me which defender dashboard has discovered these vulnerabilities on your devices, if any screenshot which you can share (if it contains sensitive information, feel free to send me an email to 'AzCom...@microsoft.com' with Sub - Attn: Givary so that I can review it further).


The solution you are suggesting is not very helpful. these applications are already up to date, and same defender isn't flagging them as vulnerable. That is counter intuitive, if an application has a vulnerable library, shouldn't you flag the application as vulnerable.

I think you should speak with users to understand our user experiences.


In some product groups, there seems to be a misunderstanding about such an issue: Sometimes it's not about "does this vulnerability affect me?", but "how can I trust my security reporting?".Without updating the product to use the current version of openssl, I simply cannot install it any more on any of our devices. Also, Microsoft gets blamed for that, because they are deploying vulnerable code to our computers (it is completely unimportant whether the code is being used or not - it is there). Our security reporting is based on Defender Vulnerability Management. So, in this case Microsoft tells us to NOT use this software until it gets an update - in this case SSMS from Microsoft.PLEASE: when there is a vulnerability in a library you use: do NOT try to find out whether it will affect you or not - simply update. There is no legitimation for a known vulnerable library on a computer other than that there is currently no updated library available. But in this case, there is: simply update the library in your product.


We have this vulnerability on almost every machine in our environment because Zoom seemingly doesn't care that their platform is vulnerable. I'm pretty disgusted, to say the least. I'll be using this example, and many others, to convince our CEO to let me migrate to Microsoft Teams instead.


The Microsoft PowerBI Desktop client also has an out of date OpenSSL version as well as several other vendors.

I tried to replace the out of date libssl-3-x64.dll and libcrypto-3-x64.dll across the machines in our domain, but Zoom signed their version of the dll files, and refuses to start with the updated dll files. Good for them for signing them, not something many other vendors do. On the flip side, they should have this patched and up to date already.

Microsoft's Cloud Defender agent for Linux (mdatp) is running a curl version that is showing as critical. Microsoft chooses to hide this on their vulnerability scans, Tenable found it.

This is not just a Zoom problem, but an industry problem with these critical open source dependencies.







I really wish we could just drop Zoom, but my boss hates Teams so we are pretty much stuck with a vulnerability on every one of our workstations. At least it isn't on any of our servers, but the workstations connect to our servers... This bad.


Still an issue. Zoom, please get this updated with a current version of OpenSSL. If you are doing a custom patch to the version you are running and consider this OK, please don't. We have no way of verifying compliance and this throws off our necessary reporting and patch management.


Zoom should move to use openssl v3.2. A much bigger problem is also in the ZOOM VDI version. it updates only one in 3 months!. I indeed dont need a new feature from Zoom for this enviornment every 2 weeks, But come on - securiry patches should be released ASAP!


This should not be marked as solved. The file versions are still listed as incorrect and there is 0 evidence or reference in official zoom documentation we can point to, and thus trust, that this fix has been backported into your custom 3.1.4 build.


I don't know if the update to address this works properly. Now we are on Zoom version 5.17.5 and our users continue to experience major issues with Zoom just closing without any error code or commonality. Just randomly closes. As usual, Zoom Support is of no real help.


@lcchelpdesk The latest Zoom client utilizes security fixes addressed in OpenSSL 3.1.5 and is packaged with version 3.1.4. Since Microsoft Defender only detects OpenSSL 3.1.4 and not our custom fix, it outputs a warning. Once OpenSSL 3.1.5 is available as a stable release, Zoom plans to adopt this version into the Zoom apps and that change will be called out in our official release notes. Thank you to @Bort for researching this internally!


Thank you so much, VA for confirming the git commits were backported into the Zoom compile of 3.1.4.

From my post on the 1st of Feb, 3.1.5 was released in full on the 30th of January, hence PaulB10000 chase up with the same on the 14th of Feb and my last chase on the 22nd.

Now that it is confirmed, we can finally file an exemption against 3.1.4 for the current CVE's.


Echoing the other user. 3.1.5 is released as stable, please work on a more easier to understand fix as this post you made is literally the only documentation available about this. It makes for a terrible story when looking to make security stakeholders aware of what the current state of the risk situation is.


I realize this is not your decision but the time to properly address this, and lack of any kind of communication, is absolutely embarrassing for a company of Zooms funding and size. We're not very far from the Zoom security failures of the early Covid days, this just reinforces that perhaps things did not change as much as the marketing teams would like us to think so.


As all of these 3x additional CVE's impacting 3.1.4 was declared AFTER the Zoom fix in the Zoom Changelogs, and the fact that no further details were declared by Zoom in the changelogs, I feel the community's concerns about Zoom and their handling of this situation are entirely valid.


Based on the above, Zoom needs to make a statement of which CVE's were backported, and the simplest method would be to patch the OpenSSL version to 3.1.5 which was formally released on the 30th of January.


March 8, 2024 version 5.17.11

New and enhanced features

Simplified AI Companion consent notifications for hosts

When the meeting host initiates the meeting summary or meeting questions features, they will no longer see the consent prompt, and instead will see a simple toast notification along the top of the meeting window, which will disappear after a few seconds. Other meeting participants will see the consent notification as a prompt along the top of the meeting window, but must acknowledge the prompt before it will disappear.

Resolved Issues

Minor bug fixes

Resolved an issue regarding the first session of a recurring meeting not syncing properly from Outlook


this are the answers from PostgreSQL forum regarding the missing files: libeay32 and ssleay32.dll are the libraries names for OpenSSL 1.0.2 and no longer used by PostgreSQL windows installers. They use OpenSSL 3.0 and the library names for those 2 DLLs would be libssl-3-x64.dll and libcrypto-3-x64.dll and present in $installdir/bin/ directory


According to the documentation, the serverParameters values should be set to null when using an EC2 managed in order to get this values directly from the environment. During my local tests, I've observed that this timeout usually happens when some of the server parameter values are not correct.


I have same problem. I use same thing for server parameters.The fleet always tell "SERVER_PROCESS_SDK_INITIALIZATION_TIMEOUT -The server process did not call InitSDK() within the time expected. Check your game session log to see why InitSDK() was not called in time".Then the fleet is not activated.I'm get some confused difference between what AWS SDK 5.x document says and actually SDK source for FProcessParameters.The api has new OnRefreshConnection callback rather than old 3.x .The document describe OnRefreshConnection with Required 'Yes' but I can't see that in the latest c++ SDK source.Is there no problem?


Additionally, you can follow this blog post on Unreal Engine 5 dedicated server development with Amazon GameLift Anywhere for insight into using GameLift Anywhere to test your builds on your local machine and rapidly resolve issues before deploying to a Managed EC2 fleet.

3a8082e126
Reply all
Reply to author
Forward
0 new messages