Mandrake Linux Security Advisory : openssl (MDKSA-2003:035)

This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing one or more security
updates.

Description :

Researchers discovered a timing-based attack on RSA keys that OpenSSL
is generally vulnerable to, unless RSA blinding is enabled. Patches
from the OpenSSL team have been applied to turn RSA blinding on by
default.

An extension of the 'Bleichenbacher attack' on RSA with PKS #1 v1.5
padding as used in SSL 3.0 and TSL 1.0 was also created by Czech
cryptologists Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa. This
attack requires the attacker to open millions of SSL/TLS connections
to the server they are attacking. This is done because the server's
behaviour when faced with specially crafted RSA ciphertexts can reveal
information that would in effect allow the attacker to perform a
single RSA private key operation on a ciphertext of their choice,
using the server's RSA key. Despite this, the server's RSA key is not
compromised at any time. Patches from the OpenSSL team modify SSL/TLS
server behaviour to avoid this vulnerability.

See also :

http://crypto.stanford.edu/~dabo/abstracts/ssl-timing.html
http://eprint.iacr.org/2003/052/
https://www.openssl.org/news/secadv/20030317.txt
https://www.openssl.org/news/secadv/20030319.txt

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 14019 (mandrake_MDKSA-2003-035.nasl)

Bugtraq ID:

CVE ID: CVE-2003-0131
CVE-2003-0147

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now