Amazon Linux AMI : openssl Multiple Vulnerabilities (ALAS-2012-62)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.

Synopsis :

The remote Amazon Linux AMI host is missing a security update.

Description :

A NULL pointer dereference flaw was found in the way OpenSSL parsed
Secure/Multipurpose Internet Mail Extensions (S/MIME) messages. An
attacker could use this flaw to crash an application that uses OpenSSL
to decrypt or verify S/MIME messages. (CVE-2012-1165)

A flaw was found in the PKCS#7 and Cryptographic Message Syntax (CMS)
implementations in OpenSSL. An attacker could possibly use this flaw
to perform a Bleichenbacher attack to decrypt an encrypted CMS,
PKCS#7, or S/MIME message by sending a large number of chosen
ciphertext messages to a service using OpenSSL and measuring error
response times. (CVE-2012-0884)

This update also fixes a regression caused by the fix for
CVE-2011-4619, released via ALAS-2012-38, which caused Server Gated
Cryptography (SGC) handshakes to fail.

See also :

Solution :

Run 'yum update openssl' to upgrade your system. For the update to
take effect, all services linked to the OpenSSL library must be
restarted, or the system rebooted.

Risk factor :

Medium / CVSS Base Score : 5.0

Family: Amazon Linux Local Security Checks

Nessus Plugin ID: 69669 ()

Bugtraq ID:

CVE ID: CVE-2012-0884