Ubuntu 12.04 LTS / 12.10 / 13.04 / 13.10 : openssl vulnerabilities (USN-2079-1)

Ubuntu Security Notice (C) 2014 Canonical, Inc. / NASL script (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

Anton Johansson discovered that OpenSSL incorrectly handled certain
invalid TLS handshakes. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service.
(CVE-2013-4353)

Ron Barber discovered that OpenSSL used an incorrect data structure to
obtain a version number. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service.
(CVE-2013-6449)

Dmitry Sobinov discovered that OpenSSL incorrectly handled certain
DTLS retransmissions. A remote attacker could use this issue to cause
OpenSSL to crash, resulting in a denial of service. (CVE-2013-6450)

This update also disables the default use of the RdRand feature of
certain Intel CPUs as the sole source of entropy.

Solution :

Update the affected libssl1.0.0 package.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 71896 ()

Bugtraq ID: 64530
64618
64691

CVE ID: CVE-2013-4353
CVE-2013-6449
CVE-2013-6450