openSUSE Security Update : nss-201112 (openSUSE-SU-2012:0030-1) (BEAST)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

The Mozilla NSS libraries were updated to version 3.13.1 to fix
various bugs and security problems.

Following security issues were fixed :

- SSL 2.0 is disabled by default

- A defense against the SSL 3.0 and TLS 1.0 CBC chosen
plaintext attack demonstrated by Rizzo and Duong
(CVE-2011-3389) is enabled by default. Set the
SSL_CBC_RANDOM_IV SSL option to PR_FALSE to disable it.
bnc#

- SHA-224 is supported

- NSS_NoDB_Init does not try to open /pkcs11.txt and
/secmod.db anymore (bmo#641052, bnc#726096)
(CVE-2011-3640)

Also following bugs were fixed :

- fix spec file syntax for qemu-workaround

- Added a patch to fix errors in the pkcs11n.h header
file. (bmo#702090)

- better SHA-224 support (bmo#647706)

- SHA-224 is supported

- Added PORT_ErrorToString and PORT_ErrorToName to return
the error message and symbolic name of an NSS error code

- Added NSS_GetVersion to return the NSS version string

- Added experimental support of RSA-PSS to the softoken
only

See also :

http://lists.opensuse.org/opensuse-updates/2012-01/msg00009.html
http://lists.opensuse.org/opensuse-updates/2012-01/msg00021.html
https://bugzilla.novell.com/show_bug.cgi?id=726096

Solution :

Update the affected nss-201112 packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 75685 ()

Bugtraq ID:

CVE ID: CVE-2011-3389
CVE-2011-3640

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now