SuSE 11.3 Security Update : gnutls (SAT Patch Number 9320)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

GnuTLS has been patched to ensure proper parsing of session ids during
the TLS/SSL handshake. Additionally, three issues inherited from
libtasn1 have been fixed.

Further information is available at
http://www.gnutls.org/security.html#GNUTLS-SA-2014-3

These security issues have been fixed :

- Possible memory corruption during connect.
(CVE-2014-3466)

- Multiple boundary check issues could allow DoS.
(CVE-2014-3467)

- asn1_get_bit_der() can return negative bit length.
(CVE-2014-3468)

- Possible DoS by NULL pointer dereference (CVE-2014-3469)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=880730
https://bugzilla.novell.com/show_bug.cgi?id=880910
http://support.novell.com/security/cve/CVE-2014-3466.html
http://support.novell.com/security/cve/CVE-2014-3467.html
http://support.novell.com/security/cve/CVE-2014-3468.html
http://support.novell.com/security/cve/CVE-2014-3469.html

Solution :

Apply SAT patch number 9320.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: SuSE Local Security Checks

Nessus Plugin ID: 74321 ()

Bugtraq ID:

CVE ID: CVE-2014-3466
CVE-2014-3467
CVE-2014-3468
CVE-2014-3469

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now