SuSE 11.3 Security Update : OpenSSL (SAT Patch Number 10150)

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

OpenSSL has been updated to fix various security issues.

More information can be found in the OpenSSL advisory: .

The following issues have been fixed :

- Bignum squaring (BN_sqr) may produce incorrect results
on some platforms, including x86_64. (bsc#912296).

- Fix crash in dtls1_get_record whilst in the listen state
where you get two separate reads performed - one for the
header and one for the body of the handshake record.
(bsc#912294). (CVE-2014-3571)

- Don't accept a handshake using an ephemeral ECDH
ciphersuites with the server key exchange message
omitted. (bsc#912015). (CVE-2014-3572)

- Fix various certificate fingerprint issues.
(bsc#912018). (CVE-2014-8275)

- Only allow ephemeral RSA keys in export ciphersuites.
(bsc#912014). (CVE-2015-0204)

- OpenSSL 0.9.8j is NOT vulnerable to CVE-2015-0205 as it
doesn't support DH certificates and this typo prohibits
skipping of certificate verify message for sign only
certificates anyway. (bsc#912293). (CVE-2015-0205)

See also :

Solution :

Apply SAT patch number 10150.

Risk factor :

Medium / CVSS Base Score : 5.0

Family: SuSE Local Security Checks

Nessus Plugin ID: 81124 ()

Bugtraq ID:

CVE ID: CVE-2014-3570

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now