openSUSE Security Update : compat-openssl098 (openSUSE-2018-997)

Medium Nessus Plugin ID 117476


The remote openSUSE host is missing a security update.


This update for compat-openssl098 fixes the following security
issues :

- CVE-2018-0732: During key agreement in a TLS handshake
using a DH(E) based ciphersuite a malicious server could
have sent a very large prime value to the client. This
caused the client to spend an unreasonably long period
of time generating a key for this prime resulting in a
hang until the client has finished. This could be
exploited in a Denial Of Service attack (bsc#1097158)

- Blinding enhancements for ECDSA and DSA (bsc#1097624,

- CVE-2018-0737: The RSA Key generation algorithm has been
shown to be vulnerable to a cache timing side channel
attack. An attacker with sufficient access to mount
cache timing attacks during the RSA key generation
process could have recovered the private key

- CVE-2018-0739: Constructed ASN.1 types with a recursive
definition (such as can be found in PKCS7) could
eventually exceed the stack given malicious input with
excessive recursion. This could have resulted in DoS

This update was imported from the SUSE:SLE-12:Update update project.


Update the affected compat-openssl098 packages.

See Also

Plugin Details

Severity: Medium

ID: 117476

File Name: openSUSE-2018-997.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2018/09/13

Modified: 2018/09/13

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3.0

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:compat-openssl098-debugsource, p-cpe:/a:novell:opensuse:libopenssl0_9_8, p-cpe:/a:novell:opensuse:libopenssl0_9_8-32bit, p-cpe:/a:novell:opensuse:libopenssl0_9_8-debuginfo, p-cpe:/a:novell:opensuse:libopenssl0_9_8-debuginfo-32bit, cpe:/o:novell:opensuse:42.3

Patch Publication Date: 2018/09/12

Reference Information

CVE: CVE-2018-0732, CVE-2018-0737, CVE-2018-0739