openSUSE Security Update : openssl (openSUSE-SU-2015:0130-1) (FREAK)

medium Nessus Plugin ID 80991
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

openssl was updated to 1.0.1k to fix various security issues and bugs.

More information can be found in the openssl advisory:
http://openssl.org/news/secadv/20150108.txt

Following issues were fixed :

- CVE-2014-3570 (bsc#912296): Bignum squaring (BN_sqr) may have produced incorrect results on some platforms, including x86_64.

- CVE-2014-3571 (bsc#912294): Fixed crash in dtls1_get_record whilst in the listen state where you get two separate reads performed - one for the header and one for the body of the handshake record.

- CVE-2014-3572 (bsc#912015): Don't accept a handshake using an ephemeral ECDH ciphersuites with the server key exchange message omitted.

- CVE-2014-8275 (bsc#912018): Fixed various certificate fingerprint issues.

- CVE-2015-0204 (bsc#912014): Only allow ephemeral RSA keys in export ciphersuites

- CVE-2015-0205 (bsc#912293): A fixwas added to prevent use of DH client certificates without sending certificate verify message.

- CVE-2015-0206 (bsc#912292): A memory leak was fixed in dtls1_buffer_record.

Solution

Update the affected openssl packages.

See Also

https://www.openssl.org/news/secadv/20150108.txt

https://bugzilla.opensuse.org/show_bug.cgi?id=911399

https://bugzilla.opensuse.org/show_bug.cgi?id=912014

https://bugzilla.opensuse.org/show_bug.cgi?id=912015

https://bugzilla.opensuse.org/show_bug.cgi?id=912018

https://bugzilla.opensuse.org/show_bug.cgi?id=912292

https://bugzilla.opensuse.org/show_bug.cgi?id=912293

https://bugzilla.opensuse.org/show_bug.cgi?id=912294

https://bugzilla.opensuse.org/show_bug.cgi?id=912296

https://lists.opensuse.org/opensuse-updates/2015-01/msg00068.html

Plugin Details

Severity: Medium

ID: 80991

File Name: openSUSE-2015-67.nasl

Version: 1.14

Type: local

Agent: unix

Published: 1/26/2015

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libopenssl-devel, p-cpe:/a:novell:opensuse:libopenssl-devel-32bit, p-cpe:/a:novell:opensuse:libopenssl1_0_0, p-cpe:/a:novell:opensuse:libopenssl1_0_0-32bit, p-cpe:/a:novell:opensuse:libopenssl1_0_0-debuginfo, p-cpe:/a:novell:opensuse:libopenssl1_0_0-debuginfo-32bit, p-cpe:/a:novell:opensuse:libopenssl1_0_0-hmac, p-cpe:/a:novell:opensuse:libopenssl1_0_0-hmac-32bit, p-cpe:/a:novell:opensuse:openssl, p-cpe:/a:novell:opensuse:openssl-debuginfo, p-cpe:/a:novell:opensuse:openssl-debugsource, cpe:/o:novell:opensuse:13.1, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 1/22/2015

Reference Information

CVE: CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE-2015-0206