openSUSE Security Update : openssl (openSUSE-2015-447) (Logjam)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

openssl was updated to fix six security issues.

The following vulnerabilities were fixed :

- CVE-2015-4000: The Logjam Attack / Rject
connections with DH parameters shorter than 768 bits,
generates 2048-bit DH parameters by default.

- CVE-2015-1788: Malformed ECParameters causes infinite
loop (boo#934487)

- CVE-2015-1789: Exploitable out-of-bounds read in
X509_cmp_time (boo#934489)

- CVE-2015-1790: PKCS7 crash with missing EnvelopedContent

- CVE-2015-1792: CMS verify infinite loop with unknown
hash function (boo#934493)

- CVE-2015-1791: race condition in NewSessionTicket

- CVE-2015-3216: Crash in ssleay_rand_bytes due to locking
regression (boo#933898)

See also :

Solution :

Update the affected openssl packages.

Risk factor :

Medium / CVSS Base Score : 6.8

Family: SuSE Local Security Checks

Nessus Plugin ID: 84414 ()

Bugtraq ID:

CVE ID: CVE-2015-1788

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now