OracleVM 3.2 : openssl (OVMSA-2016-0086)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote OracleVM host is missing a security update.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- CVE-2016-0799 - Fix memory issues in BIO_*printf
functions

- CVE-2016-2105 - Avoid overflow in EVP_EncodeUpdate

- CVE-2016-2106 - Fix encrypt overflow

- CVE-2016-2109 - Harden ASN.1 BIO handling of large
amounts of data.

- To disable SSLv2 client connections create the file
/etc/sysconfig/openssl-ssl-client-kill-sslv2 (John
Haxby) [orabug 21673934]

- Backport openssl 08-Jan-2015 security fixes (John Haxby)
[orabug 20409893]

- fix CVE-2014-3570 - Bignum squaring may produce
incorrect results

- fix CVE-2014-3571 - DTLS segmentation fault in
dtls1_get_record

- fix CVE-2014-3572 - ECDHE silently downgrades to ECDH
[Client]

- fix CVE-2016-2108 - memory corruption in ASN.1 encoder

See also :

https://oss.oracle.com/pipermail/oraclevm-errata/2016-June/000499.html

Solution :

Update the affected openssl package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: OracleVM Local Security Checks

Nessus Plugin ID: 91777 ()

Bugtraq ID: 71937
71939
71942
74107
75769

CVE ID: CVE-2014-3570
CVE-2014-3571
CVE-2014-3572
CVE-2016-0799
CVE-2016-2105
CVE-2016-2106
CVE-2016-2108
CVE-2016-2109

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now