SuSE 11.1 Security Update : OpenSSL (SAT Patch Number 6054)

medium Nessus Plugin ID 58677


The remote SuSE 11 host is missing one or more security updates.


The following security issues have been fixed :

- Specially crafted MIME headers could cause openssl's ans1 parser to dereference a NULL pointer leading to a Denial of Service (CVE-2006-7250) or fail verfication.

- The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL was vulnerable to a Million Message Attack (MMA) adaptive chosen ciphertext attack.

Additionally, the following issues have been fixed :

- Free headers after use in error message. (bnc#749213)

- Symmetric crypto errors in PKCS7_decrypt. (bnc#749210)

- Memory leak when creating public keys. (bnc#749735)


Apply SAT patch number 6054.

See Also

Plugin Details

Severity: Medium

ID: 58677

File Name: suse_11_libopenssl-devel-120327.nasl

Version: 1.7

Type: local

Agent: unix

Published: 4/11/2012

Updated: 1/19/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:libopenssl0_9_8, p-cpe:/a:novell:suse_linux:11:libopenssl0_9_8-32bit, p-cpe:/a:novell:suse_linux:11:openssl, p-cpe:/a:novell:suse_linux:11:openssl-doc, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 3/27/2012

Reference Information

CVE: CVE-2006-7250, CVE-2012-0884, CVE-2012-1165