Oracle Solaris Third-Party Patch Update : gnupg (cve_2013_4351_cryptographic_issues)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Solaris system is missing a security patch for third-party
software.

Description :

The remote Solaris system is missing necessary patches to address
security updates :

- GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags
subpacket with all bits cleared (no usage permitted) as
if it has all bits set (all usage permitted), which
might allow remote attackers to bypass intended
cryptographic protection mechanisms by leveraging the
subkey. (CVE-2013-4351)

- The compressed packet parser in GnuPG 1.4.x before
1.4.15 and 2.0.x before 2.0.22 allows remote attackers
to cause a denial of service (infinite recursion) via a
crafted OpenPGP message. (CVE-2013-4402)

See also :

http://www.nessus.org/u?b5f8def1
http://www.nessus.org/u?beac7603
http://www.nessus.org/u?73c2b5c7

Solution :

Upgrade to Solaris 11.2.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)

Family: Solaris Local Security Checks

Nessus Plugin ID: 80627 ()

Bugtraq ID:

CVE ID: CVE-2013-4351
CVE-2013-4402

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now