Debian DSA-4661-1 : openssl - security update

high Nessus Plugin ID 135879

Synopsis

The remote Debian host is missing a security-related update.

Description

Bernd Edlinger discovered that malformed data passed to the SSL_check_chain() function during or after a TLS 1.3 handshake could cause a NULL dereference, resulting in denial of service.

The oldstable distribution (stretch) is not affected.

Solution

Upgrade the openssl packages.

For the stable distribution (buster), this problem has been fixed in version 1.1.1d-0+deb10u3.

See Also

https://security-tracker.debian.org/tracker/source-package/openssl

https://packages.debian.org/source/buster/openssl

https://www.debian.org/security/2020/dsa-4661

Plugin Details

Severity: High

ID: 135879

File Name: debian_DSA-4661.nasl

Version: 1.8

Type: local

Agent: unix

Published: 4/22/2020

Updated: 12/6/2022

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2020-1967

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:openssl, cpe:/o:debian:debian_linux:10.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/21/2020

Vulnerability Publication Date: 4/21/2020

Reference Information

CVE: CVE-2020-1967

DSA: 4661

IAVA: 2020-A-0186-S