Debian dla-3249 : libmbedcrypto3 - security update

critical Nessus Plugin ID 169300

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-3249 advisory.

------------------------------------------------------------------------- Debian LTS Advisory DLA-3249-1 [email protected] https://www.debian.org/lts/security/ Markus Koschany December 26, 2022 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : mbedtls Version : 2.16.9-0~deb10u1 CVE ID : CVE-2019-16910 CVE-2019-18222 CVE-2020-10932 CVE-2020-10941 CVE-2020-16150 CVE-2020-36421 CVE-2020-36422 CVE-2020-36423 CVE-2020-36424 CVE-2020-36425 CVE-2020-36426 CVE-2020-36475 CVE-2020-36476 CVE-2020-36478 CVE-2021-24119 CVE-2021-43666 CVE-2021-44732 CVE-2022-35409 Debian Bug : 941265 963159 972806 1002631

Multiple security vulnerabilities have been discovered in mbedtls, a lightweight crypto and SSL/TLS library, which may allow attackers to obtain sensitive information like the RSA private key or cause a denial of service (application or server crash).

For Debian 10 buster, these problems have been fixed in version 2.16.9-0~deb10u1.

We recommend that you upgrade your mbedtls packages.

For the detailed security status of mbedtls please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/mbedtls

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS Attachment:
signature.asc Description: This is a digitally signed message part

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the libmbedcrypto3 packages.

See Also

https://security-tracker.debian.org/tracker/source-package/mbedtls

https://security-tracker.debian.org/tracker/CVE-2019-16910

https://security-tracker.debian.org/tracker/CVE-2019-18222

https://security-tracker.debian.org/tracker/CVE-2020-10932

https://security-tracker.debian.org/tracker/CVE-2020-10941

https://security-tracker.debian.org/tracker/CVE-2020-16150

https://security-tracker.debian.org/tracker/CVE-2020-36421

https://security-tracker.debian.org/tracker/CVE-2020-36422

https://security-tracker.debian.org/tracker/CVE-2020-36423

https://security-tracker.debian.org/tracker/CVE-2020-36424

https://security-tracker.debian.org/tracker/CVE-2020-36425

https://security-tracker.debian.org/tracker/CVE-2020-36426

https://security-tracker.debian.org/tracker/CVE-2020-36475

https://security-tracker.debian.org/tracker/CVE-2020-36476

https://security-tracker.debian.org/tracker/CVE-2020-36478

https://security-tracker.debian.org/tracker/CVE-2021-24119

https://security-tracker.debian.org/tracker/CVE-2021-43666

https://security-tracker.debian.org/tracker/CVE-2021-44732

https://security-tracker.debian.org/tracker/CVE-2022-35409

https://packages.debian.org/source/buster/mbedtls

Plugin Details

Severity: Critical

ID: 169300

File Name: debian_DLA-3249.nasl

Version: 1.2

Type: local

Agent: unix

Published: 12/26/2022

Updated: 1/22/2025

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-44732

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libmbedtls-doc, cpe:/o:debian:debian_linux:10.0, p-cpe:/a:debian:debian_linux:libmbedtls12, p-cpe:/a:debian:debian_linux:libmbedtls-dev, p-cpe:/a:debian:debian_linux:libmbedcrypto3, p-cpe:/a:debian:debian_linux:libmbedx509-0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/26/2022

Vulnerability Publication Date: 9/26/2019

Reference Information

CVE: CVE-2019-16910, CVE-2019-18222, CVE-2020-10932, CVE-2020-10941, CVE-2020-16150, CVE-2020-36421, CVE-2020-36422, CVE-2020-36423, CVE-2020-36424, CVE-2020-36425, CVE-2020-36426, CVE-2020-36475, CVE-2020-36476, CVE-2020-36478, CVE-2021-24119, CVE-2021-43666, CVE-2021-44732, CVE-2022-35409