FreeBSD : OpenSSL -- NULL pointer dereference / DoS (1959e847-d4f0-11e3-84b0-0018fe623f2b)

medium Nessus Plugin ID 73900

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

OpenBSD and David Ramos reports :

Applications that use SSL_MODE_RELEASE_BUFFERS, such as nginx/apache, are prone to a race condition which may allow a remote attacker to crash the current service.

Solution

Update the affected package.

See Also

https://www.openwall.com/lists/oss-security/2014/05/02/5

http://www.nessus.org/u?fdf04077

http://www.nessus.org/u?c6982aa4

Plugin Details

Severity: Medium

ID: 73900

File Name: freebsd_pkg_1959e847d4f011e384b00018fe623f2b.nasl

Version: 1.10

Type: local

Published: 5/7/2014

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:openssl, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 5/3/2014

Vulnerability Publication Date: 5/2/2014

Reference Information

CVE: CVE-2014-0198

BID: 67193

FreeBSD: SA-14:10.openssl