openSUSE Security Update : nss-201112 (openSUSE-SU-2012:0030-1) (BEAST)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

The Mozilla NSS libraries were updated to version 3.13.1 to fix
various bugs and security problems.

Following security issues were fixed :

- SSL 2.0 is disabled by default

- A defense against the SSL 3.0 and TLS 1.0 CBC chosen
plaintext attack demonstrated by Rizzo and Duong
(CVE-2011-3389) is enabled by default. Set the
SSL_CBC_RANDOM_IV SSL option to PR_FALSE to disable it.

- SHA-224 is supported

- NSS_NoDB_Init does not try to open /pkcs11.txt and
/secmod.db anymore (bmo#641052, bnc#726096)

Also following bugs were fixed :

- fix spec file syntax for qemu-workaround

- Added a patch to fix errors in the pkcs11n.h header
file. (bmo#702090)

- better SHA-224 support (bmo#647706)

- SHA-224 is supported

- Added PORT_ErrorToString and PORT_ErrorToName to return
the error message and symbolic name of an NSS error code

- Added NSS_GetVersion to return the NSS version string

- Added experimental support of RSA-PSS to the softoken

See also :

Solution :

Update the affected nss-201112 packages.

Risk factor :

High / CVSS Base Score : 9.3

Family: SuSE Local Security Checks

Nessus Plugin ID: 75685 ()

Bugtraq ID:

CVE ID: CVE-2011-3389

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now