openSUSE Security Update : compat-openssl098 (openSUSE-2018-997)

high Nessus Plugin ID 117476

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for compat-openssl098 fixes the following security issues :

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server could have sent a very large prime value to the client. This caused the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack (bsc#1097158)

- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could have recovered the private key (bsc#1089039)

- CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could have resulted in DoS (bsc#1087102).

This update was imported from the SUSE:SLE-12:Update update project.

Solution

Update the affected compat-openssl098 packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1087102

https://bugzilla.opensuse.org/show_bug.cgi?id=1097158

https://bugzilla.opensuse.org/show_bug.cgi?id=1089039

https://bugzilla.opensuse.org/show_bug.cgi?id=1097624

https://bugzilla.opensuse.org/show_bug.cgi?id=1098592

Plugin Details

Severity: High

ID: 117476

File Name: openSUSE-2018-997.nasl

Version: 1.3

Type: local

Agent: unix

Published: 9/13/2018

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: cpe:2.3:o:novell:opensuse:42.3:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:compat-openssl098-debugsource:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libopenssl0_9_8:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libopenssl0_9_8-32bit:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libopenssl0_9_8-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:libopenssl0_9_8-debuginfo-32bit:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 9/12/2018

Reference Information

CVE: CVE-2018-0739, CVE-2018-0732, CVE-2018-0737