Debian DSA-3566-1 : openssl - security update

critical Nessus Plugin ID 90896

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities were discovered in OpenSSL, a Secure Socket Layer toolkit.

- CVE-2016-2105 Guido Vranken discovered that an overflow can occur in the function EVP_EncodeUpdate(), used for Base64 encoding, if an attacker can supply a large amount of data. This could lead to a heap corruption.

- CVE-2016-2106 Guido Vranken discovered that an overflow can occur in the function EVP_EncryptUpdate() if an attacker can supply a large amount of data. This could lead to a heap corruption.

- CVE-2016-2107 Juraj Somorovsky discovered a padding oracle in the AES CBC cipher implementation based on the AES-NI instruction set. This could allow an attacker to decrypt TLS traffic encrypted with one of the cipher suites based on AES CBC.

- CVE-2016-2108 David Benjamin from Google discovered that two separate bugs in the ASN.1 encoder, related to handling of negative zero integer values and large universal tags, could lead to an out-of-bounds write.

- CVE-2016-2109 Brian Carpenter discovered that when ASN.1 data is read from a BIO using functions such as d2i_CMS_bio(), a short invalid encoding can cause allocation of large amounts of memory potentially consuming excessive resources or exhausting memory.

Additional information about these issues can be found in the OpenSSL security advisory at https://www.openssl.org/news/secadv/20160503.txt

Solution

Upgrade the openssl packages.

For the stable distribution (jessie), these problems have been fixed in version 1.0.1k-3+deb8u5.

See Also

https://security-tracker.debian.org/tracker/CVE-2016-2105

https://security-tracker.debian.org/tracker/CVE-2016-2106

https://security-tracker.debian.org/tracker/CVE-2016-2107

https://security-tracker.debian.org/tracker/CVE-2016-2108

https://security-tracker.debian.org/tracker/CVE-2016-2109

https://www.openssl.org/news/secadv/20160503.txt

https://packages.debian.org/source/jessie/openssl

https://www.debian.org/security/2016/dsa-3566

Plugin Details

Severity: Critical

ID: 90896

File Name: debian_DSA-3566.nasl

Version: 2.17

Type: local

Agent: unix

Published: 5/5/2016

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:openssl, cpe:/o:debian:debian_linux:8.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/3/2016

Reference Information

CVE: CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109

DSA: 3566