FreeBSD : OpenSSL -- Multiple vulnerabilities (5a668ab3-8d86-11eb-b8d6-d4c9ef517024)

high Nessus Plugin ID 148200

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The OpenSSL project reports :

High: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default.

High: NULL pointer deref in signature_algorithms processing (CVE-2021-3449)An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack.

Solution

Update the affected package.

See Also

https://www.openssl.org/news/secadv/20210325.txt

http://www.nessus.org/u?c4e8635e

Plugin Details

Severity: High

ID: 148200

File Name: freebsd_pkg_5a668ab38d8611ebb8d6d4c9ef517024.nasl

Version: 1.9

Type: local

Published: 3/29/2021

Updated: 1/8/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2021-3450

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:openssl, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/26/2021

Vulnerability Publication Date: 3/25/2021

Reference Information

CVE: CVE-2021-3449, CVE-2021-3450

FreeBSD: SA-21:07.openssl

IAVA: 2021-A-0149-S