Mandriva Linux Security Advisory : openssl (MDVSA-2010:076-1)

critical Nessus Plugin ID 45563

Language:

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

This update fixes several security issues in openssl :

- The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection (CVE-2010-0740)

- OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls which has unspecified impact and context-dependent attack vectors (CVE-2009-3245)

- The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, could allow remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) (CVE-2010-0433)

- Finally, this update provides support for secure renegotiation, preventing men-in-the-middle attacks (CVE-2009-3555).

Packages for 2008.0 and 2009.0 are provided due to the Extended Maintenance Program for those products.

Update :

Packages for 2009.0 are provided due to the Extended Maintenance Program.

Solution

Update the affected packages.

Plugin Details

Severity: Critical

ID: 45563

File Name: mandriva_MDVSA-2010-076.nasl

Version: 1.19

Type: local

Published: 4/19/2010

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:libopenssl0.9.8-devel, p-cpe:/a:mandriva:linux:libopenssl0.9.8-static-devel, p-cpe:/a:mandriva:linux:lib64openssl0.9.8-devel, p-cpe:/a:mandriva:linux:openssl, p-cpe:/a:mandriva:linux:lib64openssl0.9.8-static-devel, p-cpe:/a:mandriva:linux:libopenssl0.9.8, p-cpe:/a:mandriva:linux:lib64openssl0.9.8, cpe:/o:mandriva:linux:2009.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/19/2010

Reference Information

CVE: CVE-2009-3245, CVE-2009-3555, CVE-2010-0433, CVE-2010-0740

BID: 36935, 38533, 38562, 39013

CWE: 20, 310

MDVSA: 2010:076-1