FreeBSD : OpenSSL -- Multiple problems in crypto(3) (0f37d765-c5d4-11db-9f82-000e0c2e438a)

critical Nessus Plugin ID 24719

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Several problems have been found in OpenSSL :

- During the parsing of certain invalid ASN1 structures an error condition is mishandled, possibly resulting in an infinite loop.

- A buffer overflow exists in the SSL_get_shared_ciphers function.

- A NULL pointer may be dereferenced in the SSL version 2 client code.

In addition, many applications using OpenSSL do not perform any validation of the lengths of public keys being used. Impact : Servers which parse ASN1 data from untrusted sources may be vulnerable to a denial of service attack.

An attacker accessing a server which uses SSL version 2 may be able to execute arbitrary code with the privileges of that server.

A malicious SSL server can cause clients connecting using SSL version 2 to crash.

Applications which perform public key operations using untrusted keys may be vulnerable to a denial of service attack. Workaround : No workaround is available, but not all of the vulnerabilities mentioned affect all applications.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?a3352693

Plugin Details

Severity: Critical

ID: 24719

File Name: freebsd_pkg_0f37d765c5d411db9f82000e0c2e438a.nasl

Version: 1.22

Type: local

Published: 2/27/2007

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:openssl, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2/26/2007

Vulnerability Publication Date: 9/28/2006

Reference Information

CVE: CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-4343

CWE: 119, 399

FreeBSD: SA-06:23.openssl