openSUSE Security Update : openssl-1_0_0 (openSUSE-2019-753)

Medium Nessus Plugin ID 123323

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 4.4

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for openssl-1_0_0 to 1.0.2p fixes the following issues :

These security issues were fixed :

- Prevent One&Done side-channel attack on RSA that allowed physically near attackers to use EM emanations to recover information (bsc#1104789)

- CVE-2018-0737: The RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could have recovered the private key (bsc#1089039)

- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server could have sent a very large prime value to the client. This caused the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack (bsc#1097158)

- Make problematic ECDSA sign addition length-invariant

- Add blinding to ECDSA and DSA signatures to protect against side channel attacks

This non-security issue was fixed :

- Add openssl(cli) Provide so the packages that require the openssl binary can require this instead of the new openssl meta package (bsc#1101470)

This update was imported from the SUSE:SLE-15:Update update project.

Solution

Update the affected openssl-1_0_0 packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1089039

https://bugzilla.opensuse.org/show_bug.cgi?id=1097158

https://bugzilla.opensuse.org/show_bug.cgi?id=1101470

https://bugzilla.opensuse.org/show_bug.cgi?id=1104789

https://bugzilla.opensuse.org/show_bug.cgi?id=1106197

Plugin Details

Severity: Medium

ID: 123323

File Name: openSUSE-2019-753.nasl

Version: 1.3

Type: local

Agent: unix

Published: 2019/03/27

Updated: 2020/09/22

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 4.4

CVSS Score Source: CVE-2018-0737

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libopenssl-1_0_0-devel, p-cpe:/a:novell:opensuse:libopenssl-1_0_0-devel-32bit, p-cpe:/a:novell:opensuse:libopenssl1_0_0, p-cpe:/a:novell:opensuse:libopenssl1_0_0-32bit, p-cpe:/a:novell:opensuse:libopenssl1_0_0-32bit-debuginfo, p-cpe:/a:novell:opensuse:libopenssl1_0_0-debuginfo, p-cpe:/a:novell:opensuse:libopenssl1_0_0-hmac, p-cpe:/a:novell:opensuse:libopenssl1_0_0-hmac-32bit, p-cpe:/a:novell:opensuse:libopenssl1_0_0-steam, p-cpe:/a:novell:opensuse:libopenssl1_0_0-steam-32bit, p-cpe:/a:novell:opensuse:libopenssl1_0_0-steam-32bit-debuginfo, p-cpe:/a:novell:opensuse:libopenssl1_0_0-steam-debuginfo, p-cpe:/a:novell:opensuse:openssl-1_0_0, p-cpe:/a:novell:opensuse:openssl-1_0_0-cavs, p-cpe:/a:novell:opensuse:openssl-1_0_0-cavs-debuginfo, p-cpe:/a:novell:opensuse:openssl-1_0_0-debuginfo, p-cpe:/a:novell:opensuse:openssl-1_0_0-debugsource, cpe:/o:novell:opensuse:15.0

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 2019/03/23

Vulnerability Publication Date: 2018/04/16

Reference Information

CVE: CVE-2018-0732, CVE-2018-0737