Fedora 21 : mingw-openssl-1.0.1j-1.fc21 (2014-17576) (POODLE)

High Nessus Plugin ID 80319

Synopsis

The remote Fedora host is missing a security update.

Description

- Synced with native openssl-1.0.1j-3.fc22\r\n* Add support for RFC 5649\r\n* Prevent compiler warning 'Please include winsock2.h before windows.h' when using the OpenSSL headers\r\n* Fixes various CVE's

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected mingw-openssl package.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=1096234

https://bugzilla.redhat.com/show_bug.cgi?id=1127705

https://bugzilla.redhat.com/show_bug.cgi?id=1152851

http://www.nessus.org/u?be287fce

Plugin Details

Severity: High

ID: 80319

File Name: fedora_2014-17576.nasl

Version: 1.14

Type: local

Agent: unix

Published: 2015/01/02

Updated: 2018/12/05

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 6.8

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:mingw-openssl, cpe:/o:fedoraproject:fedora:21

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/12/25

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-5298, CVE-2014-0195, CVE-2014-0198, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470, CVE-2014-3505, CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3509, CVE-2014-3510, CVE-2014-3511, CVE-2014-3566

BID: 66801, 67193, 67898, 67899, 67900, 67901, 69075, 69076, 69078, 69079, 69081, 69082, 69084, 70574

FEDORA: 2014-17576