Mandriva Linux Security Advisory : stunnel (MDVSA-2015:096)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing a security update.

Description :

Updated stunnel package fixes security vulnerability :

A flaw was found in the way stunnel, a socket wrapper which can
provide SSL support to ordinary applications, performed
(re)initialization of PRNG after fork. When accepting a new
connection, the server forks and the child process handles the
request. The RAND_bytes() function of openssl doesn't reset its state
after the fork, but seeds the PRNG with the output of time(NULL). The
most important consequence is that servers using EC (ECDSA) or DSA
certificates may under certain conditions leak their private key
(CVE-2014-0016).

The updated packages fix this issue by using threads instead of new
processes to handle connections.

Also an issue has been corrected where the directory for the pid file
was not being created when the package is installed.

An issue currently exists in Mageia 4 where it fails trying to use
FIPS SSL (mga#13124). This can be worked around by adding fips = no
into the config.

See also :

http://advisories.mageia.org/MGASA-2014-0144.html

Solution :

Update the affected stunnel package.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 82349 ()

Bugtraq ID:

CVE ID: CVE-2014-0016

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now