GLSA-201601-05 : OpenSSL: Multiple vulnerabilities

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-201601-05
(OpenSSL: Multiple vulnerabilities)

Multiple vulnerabilities have been discovered in OpenSSL. Please review
the upstream advisory and CVE identifiers referenced below for details.
Note that the list includes CVE identifiers for an older OpenSSL Security
Advisory (3 Dec 2015) for which we have not issued a GLSA before.

Impact :

A remote attacker could disclose a server’s private DH exponent, or
complete SSLv2 handshakes using ciphers that have been disabled on the
server.

Workaround :

There is no known workaround at this time.

See also :

https://openssl.org/news/secadv/20160128.txt
https://security.gentoo.org/glsa/201601-05

Solution :

All OpenSSL users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-libs/openssl-1.0.2f'

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: Gentoo Local Security Checks

Nessus Plugin ID: 88586 ()

Bugtraq ID:

CVE ID: CVE-2015-1794
CVE-2015-3193
CVE-2015-3194
CVE-2015-3195
CVE-2015-3196
CVE-2015-3197
CVE-2016-0701

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now