FreeBSD : OpenSSL -- NULL pointer dereference / DoS (1959e847-d4f0-11e3-84b0-0018fe623f2b)

Medium Nessus Plugin ID 73900

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

OpenBSD and David Ramos reports :

Applications that use SSL_MODE_RELEASE_BUFFERS, such as nginx/apache, are prone to a race condition which may allow a remote attacker to crash the current service.

Solution

Update the affected package.

See Also

https://www.openwall.com/lists/oss-security/2014/05/02/5

http://www.nessus.org/u?fdf04077

http://www.nessus.org/u?c6982aa4

Plugin Details

Severity: Medium

ID: 73900

File Name: freebsd_pkg_1959e847d4f011e384b00018fe623f2b.nasl

Version: 1.8

Type: local

Published: 2014/05/07

Updated: 2018/11/21

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:openssl, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/05/03

Vulnerability Publication Date: 2014/05/02

Reference Information

CVE: CVE-2014-0198

BID: 67193

FreeBSD: SA-14:10.openssl