Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS / 14.10 : openssl vulnerabilities (USN-2459-1) (FREAK)

Ubuntu Security Notice (C) 2015-2016 Canonical, Inc. / NASL script (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related
patches.

Description :

Pieter Wuille discovered that OpenSSL incorrectly handled Bignum
squaring. (CVE-2014-3570)

Markus Stenberg discovered that OpenSSL incorrectly handled certain
crafted DTLS messages. A remote attacker could use this issue to cause
OpenSSL to crash, resulting in a denial of service. (CVE-2014-3571)

Karthikeyan Bhargavan discovered that OpenSSL incorrectly handled
certain handshakes. A remote attacker could possibly use this issue to
downgrade to ECDH, removing forward secrecy from the ciphersuite.
(CVE-2014-3572)

Antti Karjalainen, Tuomo Untinen and Konrad Kraszewski discovered that
OpenSSL incorrectly handled certain certificate fingerprints. A remote
attacker could possibly use this issue to trick certain applications
that rely on the uniqueness of fingerprints. (CVE-2014-8275)

Karthikeyan Bhargavan discovered that OpenSSL incorrectly handled
certain key exchanges. A remote attacker could possibly use this issue
to downgrade the security of the session to EXPORT_RSA.
(CVE-2015-0204)

Karthikeyan Bhargavan discovered that OpenSSL incorrectly handled
client authentication. A remote attacker could possibly use this issue
to authenticate without the use of a private key in certain limited
scenarios. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10.
(CVE-2015-0205)

Chris Mueller discovered that OpenSSL incorrect handled memory when
processing DTLS records. A remote attacker could use this issue to
cause OpenSSL to consume resources, resulting in a denial of service.
This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu
14.10. (CVE-2015-0206).

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected libssl0.9.8 and / or libssl1.0.0 packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 80471 ()

Bugtraq ID: 71935
71936
71937
71939
71940
71941
71942

CVE ID: CVE-2014-3570
CVE-2014-3571
CVE-2014-3572
CVE-2014-8275
CVE-2015-0204
CVE-2015-0205
CVE-2015-0206

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now