OracleVM 3.3 / 3.4 : gnutls (OVMSA-2017-0054)

critical Nessus Plugin ID 99081

Synopsis

The remote OracleVM host is missing one or more security updates.

Description

The remote OracleVM system is missing necessary patches to address critical security updates :

- Upgraded to 2.12.23 to incorporate multiple TLS 1.2 fixes (#1326389, #1326073, #1323215, #1320982, #1328205, #1321112)

- Modified gnutls-serv to accept --sni-hostname (#1333521)

- Modified gnutls-serv to always reply with an alert message (#1327656)

- Removed support for DSA2 as it causes interoperability issues (#1321112)

- Allow sending and receiving certificates which were not in the signature algorithms extension (#1328205)

- Removed support for EXPORT ciphersuites (#1337460)

- Raised the minimum acceptable DH size to 1024 (#1335924)

- Restricted the number of alert that can be received during handshake (#1388730)

- Added fixes for OpenPGP parsing issues (CVE-2017-5337, CVE-2017-5336, CVE-2017-5335)

- The exposed (but internal) crypto back-end registration API is deprecated and no longer functional. The ABI is kept compatible (#1415682)

Solution

Update the affected gnutls / gnutls-utils packages.

See Also

http://www.nessus.org/u?656eaa25

http://www.nessus.org/u?a6fc511e

Plugin Details

Severity: Critical

ID: 99081

File Name: oraclevm_OVMSA-2017-0054.nasl

Version: 3.6

Type: local

Published: 3/30/2017

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:gnutls, p-cpe:/a:oracle:vm:gnutls-utils, cpe:/o:oracle:vm_server:3.3, cpe:/o:oracle:vm_server:3.4

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/29/2017

Vulnerability Publication Date: 3/24/2017

Reference Information

CVE: CVE-2017-5335, CVE-2017-5336, CVE-2017-5337