SuSE 11.3 Security Update : compat-openssl097g (SAT Patch Number 10208)

Medium Nessus Plugin ID 81120


The remote SuSE 11 host is missing one or more security updates.


OpenSSL (compat-openssl097g) has been updated to fix various security issues.

More information can be found in the openssl advisory: .

The following issues have been fixed :

- Bignum squaring (BN_sqr) may have produced incorrect results on some platforms, including x86_64.
(bsc#912296). (CVE-2014-3570)

- Don't accept a handshake using an ephemeral ECDH ciphersuites with the server key exchange message omitted. (bsc#912015). (CVE-2014-3572)

- Fixed various certificate fingerprint issues.
(bsc#912018). (CVE-2014-8275)

- Only allow ephemeral RSA keys in export ciphersuites.
(bsc#912014). (CVE-2015-0204)

- A fix was added to prevent use of DH client certificates without sending certificate verify message. Note that compat-openssl097g is not affected by this problem, a fix was however applied to the sources. (bsc#912293).


Apply SAT patch number 10208.

See Also

Plugin Details

Severity: Medium

ID: 81120

File Name: suse_11_compat-openssl097g-150122.nasl

Version: $Revision: 1.6 $

Type: local

Agent: unix

Published: 2015/02/02

Modified: 2015/06/21

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:compat-openssl097g, p-cpe:/a:novell:suse_linux:11:compat-openssl097g-32bit, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2015/01/22

Reference Information

CVE: CVE-2014-3570, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205