OracleVM 3.2 : openssl (OVMSA-2016-0071)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote OracleVM host is missing a security update.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- To disable SSLv2 client connections create the file
/etc/sysconfig/openssl-ssl-client-kill-sslv2 (John
Haxby) [orabug 21673934]

- Backport openssl 08-Jan-2015 security fixes (John Haxby)
[orabug 20409893]

- fix CVE-2014-3570 - Bignum squaring may produce
incorrect results

- fix CVE-2014-3571 - DTLS segmentation fault in
dtls1_get_record

- fix CVE-2014-3572 - ECDHE silently downgrades to ECDH
[Client]

- fix CVE-2016-0797 - heap corruption in BN_hex2bn and
BN_dec2bn

- fix CVE-2015-3197 - SSLv2 ciphersuite enforcement

- disable SSLv2 in the generic TLS method (can be
reenabled by setting environment variable
OPENSSL_ENABLE_SSL2)

- fix CVE-2015-3195 - X509_ATTRIBUTE memory leak

See also :

https://oss.oracle.com/pipermail/oraclevm-errata/2016-June/000490.html

Solution :

Update the affected openssl package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: OracleVM Local Security Checks

Nessus Plugin ID: 91751 ()

Bugtraq ID: 71937
71939
71942
74107
75769

CVE ID: CVE-2014-3570
CVE-2014-3571
CVE-2014-3572
CVE-2015-3195
CVE-2015-3197
CVE-2016-0797

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now