SuSE 11.1 Security Update : OpenSSL (SAT Patch Number 6054)

Medium Nessus Plugin ID 58678


The remote SuSE 11 host is missing one or more security updates.


The following security issues have been fixed :

- Specially crafted MIME headers could cause openssl's ans1 parser to dereference a NULL pointer leading to a Denial of Service (CVE-2006-7250) or fail verfication.

- The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL was vulnerable to a Million Message Attack (MMA) adaptive chosen ciphertext attack.

Additionally, the following issues have been fixed :

- Free headers after use in error message. (bnc#749213)

- Symmetric crypto errors in PKCS7_decrypt. (bnc#749210)

- Memory leak when creating public keys. (bnc#749735)


Apply SAT patch number 6054.

See Also

Plugin Details

Severity: Medium

ID: 58678

File Name: suse_11_libopenssl-devel-120328.nasl

Version: Revision: 1.5

Type: local

Agent: unix

Published: 2012/04/11

Updated: 2013/10/25

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:libopenssl0_9_8, p-cpe:/a:novell:suse_linux:11:libopenssl0_9_8-32bit, p-cpe:/a:novell:suse_linux:11:openssl, p-cpe:/a:novell:suse_linux:11:openssl-doc, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2012/03/28

Reference Information

CVE: CVE-2006-7250, CVE-2012-0884, CVE-2012-1165