openSUSE Security Update : openssl (openSUSE-2015-447) (Logjam)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

openssl was updated to fix six security issues.

The following vulnerabilities were fixed :

- CVE-2015-4000: The Logjam Attack / weakdh.org. Rject
connections with DH parameters shorter than 768 bits,
generates 2048-bit DH parameters by default.
(boo#931698)

- CVE-2015-1788: Malformed ECParameters causes infinite
loop (boo#934487)

- CVE-2015-1789: Exploitable out-of-bounds read in
X509_cmp_time (boo#934489)

- CVE-2015-1790: PKCS7 crash with missing EnvelopedContent
(boo#934491)

- CVE-2015-1792: CMS verify infinite loop with unknown
hash function (boo#934493)

- CVE-2015-1791: race condition in NewSessionTicket
(boo#933911)

- CVE-2015-3216: Crash in ssleay_rand_bytes due to locking
regression (boo#933898)

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=931698
https://bugzilla.opensuse.org/show_bug.cgi?id=933898
https://bugzilla.opensuse.org/show_bug.cgi?id=933911
https://bugzilla.opensuse.org/show_bug.cgi?id=934487
https://bugzilla.opensuse.org/show_bug.cgi?id=934489
https://bugzilla.opensuse.org/show_bug.cgi?id=934491
https://bugzilla.opensuse.org/show_bug.cgi?id=934493
https://bugzilla.opensuse.org/show_bug.cgi?id=934494

Solution :

Update the affected openssl packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: SuSE Local Security Checks

Nessus Plugin ID: 84414 ()

Bugtraq ID:

CVE ID: CVE-2015-1788
CVE-2015-1789
CVE-2015-1790
CVE-2015-1791
CVE-2015-1792
CVE-2015-3216
CVE-2015-4000

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now