Mandriva Linux Security Advisory : openssl (MDVSA-2012:006)

High Nessus Plugin ID 57568


The remote Mandriva Linux host is missing one or more security updates.


Multiple vulnerabilities has been found and corrected in openssl :

The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack (CVE-2011-4108).

Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check (CVE-2011-4109).

The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer (CVE-2011-4576).

The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service via unspecified vectors (CVE-2011-4619).

The updated packages have been patched to correct these issues.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 57568

File Name: mandriva_MDVSA-2012-006.nasl

Version: $Revision: 1.9 $

Type: local

Published: 2012/01/17

Modified: 2015/09/01

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64openssl-engines1.0.0, p-cpe:/a:mandriva:linux:lib64openssl0.9.8, p-cpe:/a:mandriva:linux:lib64openssl1.0.0, p-cpe:/a:mandriva:linux:lib64openssl1.0.0-devel, p-cpe:/a:mandriva:linux:lib64openssl1.0.0-static-devel, p-cpe:/a:mandriva:linux:libopenssl-engines1.0.0, p-cpe:/a:mandriva:linux:libopenssl0.9.8, p-cpe:/a:mandriva:linux:libopenssl1.0.0, p-cpe:/a:mandriva:linux:libopenssl1.0.0-devel, p-cpe:/a:mandriva:linux:libopenssl1.0.0-static-devel, p-cpe:/a:mandriva:linux:openssl, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/01/16

Reference Information

CVE: CVE-2011-4108, CVE-2011-4109, CVE-2011-4576, CVE-2011-4619

BID: 51281

MDVSA: 2012:006