SUSE SLES11 Security Update : openssl (SUSE-SU-2017:0585-1)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641) Security issues
fixed :

- CVE-2016-7056: A local ECSDA P-256 timing attack that
might have allowed key recovery was fixed (bsc#1019334)

- CVE-2016-8610: A remote denial of service in SSL alert
handling was fixed (bsc#1005878)

- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)

- CVE-2016-2108: Added a missing commit for CVE-2016-2108,
fixing the negative zero handling in the ASN.1 decoder
(bsc#1004499) Bugs fixed :

- fix crash in openssl speed (bsc#1000677)

- don't attempt session resumption if no ticket is present
and session ID length is zero (bsc#984663)

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.suse.com/1000677
https://bugzilla.suse.com/1001912
https://bugzilla.suse.com/1004499
https://bugzilla.suse.com/1005878
https://bugzilla.suse.com/1019334
https://bugzilla.suse.com/1021641
https://bugzilla.suse.com/984663
https://www.suse.com/security/cve/CVE-2016-2108.html
https://www.suse.com/security/cve/CVE-2016-7056.html
https://www.suse.com/security/cve/CVE-2016-8610.html
http://www.nessus.org/u?e9dfab1a

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Studio Onsite 1.3:zypper in -t patch slestso13-openssl-12999=1

SUSE OpenStack Cloud 5:zypper in -t patch sleclo50sp3-openssl-12999=1

SUSE Manager Proxy 2.1:zypper in -t patch slemap21-openssl-12999=1

SUSE Manager 2.1:zypper in -t patch sleman21-openssl-12999=1

SUSE Linux Enterprise Software Development Kit 11-SP4:zypper in -t
patch sdksp4-openssl-12999=1

SUSE Linux Enterprise Server 11-SP4:zypper in -t patch
slessp4-openssl-12999=1

SUSE Linux Enterprise Server 11-SP3-LTSS:zypper in -t patch
slessp3-openssl-12999=1

SUSE Linux Enterprise Point of Sale 11-SP3:zypper in -t patch
sleposp3-openssl-12999=1

SUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch
dbgsp4-openssl-12999=1

SUSE Linux Enterprise Debuginfo 11-SP3:zypper in -t patch
dbgsp3-openssl-12999=1

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: SuSE Local Security Checks

Nessus Plugin ID: 97494 ()

Bugtraq ID:

CVE ID: CVE-2016-2108
CVE-2016-7056
CVE-2016-8610

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now