OracleVM 3.3 / 3.4 : openssl (OVMSA-2016-0135)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote OracleVM host is missing a security update.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- fix CVE-2016-2177 - possible integer overflow

- fix CVE-2016-2178 - non-constant time DSA operations

- fix CVE-2016-2179 - further DoS issues in DTLS

- fix CVE-2016-2180 - OOB read in TS_OBJ_print_bio

- fix CVE-2016-2181 - DTLS1 replay protection and
unprocessed records issue

- fix CVE-2016-2182 - possible buffer overflow in
BN_bn2dec

- fix CVE-2016-6302 - insufficient TLS session ticket HMAC
length check

- fix CVE-2016-6304 - unbound memory growth with OCSP
status request

- fix CVE-2016-6306 - certificate message OOB reads

- mitigate CVE-2016-2183 - degrade all 64bit block ciphers
and RC4 to 112 bit effective strength

- replace expired testing certificates

- fix CVE-2016-2105 - possible overflow in base64 encoding

- fix CVE-2016-2106 - possible overflow in
EVP_EncryptUpdate

- fix CVE-2016-2107 - padding oracle in stitched AES-NI
CBC-MAC

- fix CVE-2016-2108 - memory corruption in ASN.1 encoder

- fix CVE-2016-2109 - possible DoS when reading ASN.1 data
from BIO

- fix CVE-2016-0799 - memory issues in BIO_printf

See also :

http://www.nessus.org/u?f71a0ba1
http://www.nessus.org/u?2738e920

Solution :

Update the affected openssl package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now