Mandriva Linux Security Advisory : openssl (MDVSA-2011:137)

medium Nessus Plugin ID 56325

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities has been discovered and corrected in openssl :

The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation (CVE-2011-1945).

crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past (CVE-2011-3207).

The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8s and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages, which allows remote attackers to cause a denial of service (application crash) via out-of-order messages that violate the TLS protocol (CVE-2011-3210).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149 products_id=490

The updated packages have been patched to correct these issues.

Solution

Update the affected packages.

Plugin Details

Severity: Medium

ID: 56325

File Name: mandriva_MDVSA-2011-137.nasl

Version: 1.12

Type: local

Published: 9/29/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:libopenssl-devel, p-cpe:/a:mandriva:linux:libopenssl-engines1.0.0, p-cpe:/a:mandriva:linux:libopenssl-static-devel, p-cpe:/a:mandriva:linux:libopenssl1.0.0, p-cpe:/a:mandriva:linux:libopenssl1.0.0-devel, p-cpe:/a:mandriva:linux:libopenssl1.0.0-static-devel, p-cpe:/a:mandriva:linux:openssl, cpe:/o:mandriva:linux:2010.1, cpe:/o:mandriva:linux:2011, p-cpe:/a:mandriva:linux:lib64openssl-devel, p-cpe:/a:mandriva:linux:lib64openssl-engines1.0.0, p-cpe:/a:mandriva:linux:lib64openssl-static-devel, p-cpe:/a:mandriva:linux:lib64openssl1.0.0, p-cpe:/a:mandriva:linux:lib64openssl1.0.0-devel, p-cpe:/a:mandriva:linux:lib64openssl1.0.0-static-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/28/2011

Reference Information

CVE: CVE-2011-1945, CVE-2011-3207, CVE-2011-3210

BID: 47888, 49469, 49471

MDVSA: 2011:137