Debian DSA-2309-1 : openssl - compromised certificate authority

low Nessus Plugin ID 56179

Synopsis

The remote Debian host is missing a security-related update.

Description

Several fraudulent SSL certificates have been found in the wild issued by the DigiNotar Certificate Authority, obtained through a security compromise of said company. After further updates on this incident, it has been determined that all of DigiNotar's signing certificates can no longer be trusted. Debian, like other software distributors and vendors, has decided to distrust all of DigiNotar's CAs. In this update, this is done in the crypto library (a component of the OpenSSL toolkit) by marking such certificates as revoked. Any application that uses said component should now reject certificates signed by DigiNotar. Individual applications may allow users to override the validation failure. However, making exceptions is highly discouraged and should be carefully verified.

Additionally, a vulnerability has been found in the ECDHE_ECDS cipher where timing attacks make it easier to determine private keys. The Common Vulnerabilities and Exposures project identifies it as CVE-2011-1945.

Solution

Upgrade the openssl packages.

For the oldstable distribution (lenny), these problems have been fixed in version 0.9.8g-15+lenny12.

For the stable distribution (squeeze), these problems have been fixed in version 0.9.8o-4squeeze2.

See Also

https://security-tracker.debian.org/tracker/CVE-2011-1945

https://packages.debian.org/source/squeeze/openssl

https://www.debian.org/security/2011/dsa-2309

Plugin Details

Severity: Low

ID: 56179

File Name: debian_DSA-2309.nasl

Version: 1.14

Type: local

Agent: unix

Published: 9/14/2011

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.3

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 1.9

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:6.0, p-cpe:/a:debian:debian_linux:openssl, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 9/13/2011

Reference Information

CVE: CVE-2011-1945

BID: 47888

DSA: 2309