OracleVM 3.3 / 3.4 : openssl (OVMSA-2016-0049) (SLOTH)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote OracleVM host is missing a security update.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- fix CVE-2016-2105 - possible overflow in base64 encoding

- fix CVE-2016-2106 - possible overflow in
EVP_EncryptUpdate

- fix CVE-2016-2107 - padding oracle in stitched AES-NI
CBC-MAC

- fix CVE-2016-2108 - memory corruption in ASN.1 encoder

- fix CVE-2016-2109 - possible DoS when reading ASN.1 data
from BIO

- fix CVE-2016-0799 - memory issues in BIO_printf

- fix CVE-2016-0702 - side channel attack on modular
exponentiation

- fix CVE-2016-0705 - double-free in DSA private key
parsing

- fix CVE-2016-0797 - heap corruption in BN_hex2bn and
BN_dec2bn

- fix CVE-2015-3197 - SSLv2 ciphersuite enforcement

- disable SSLv2 in the generic TLS method

- fix 1-byte memory leak in pkcs12 parse (#1229871)

- document some options of the speed command (#1197095)

- fix high-precision timestamps in timestamping authority

- fix CVE-2015-7575 - disallow use of MD5 in TLS1.2

- fix CVE-2015-3194 - certificate verify crash with
missing PSS parameter

- fix CVE-2015-3195 - X509_ATTRIBUTE memory leak

- fix CVE-2015-3196 - race condition when handling PSK
identity hint

See also :

https://oss.oracle.com/pipermail/oraclevm-errata/2016-May/000463.html
https://oss.oracle.com/pipermail/oraclevm-errata/2016-May/000459.html

Solution :

Update the affected openssl package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now