openSUSE Security Update : openssl (openSUSE-2016-562)

Critical Nessus Plugin ID 91067

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for openssl fixes the following issues :

- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)

- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)

- CVE-2016-2107: Padding oracle in AES-NI CBC MAC check (bsc#977616)

- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)

- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)

- bsc#976943: Buffer overrun in ASN1_parse

Solution

Update the affected openssl packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=976942

https://bugzilla.opensuse.org/show_bug.cgi?id=976943

https://bugzilla.opensuse.org/show_bug.cgi?id=977614

https://bugzilla.opensuse.org/show_bug.cgi?id=977615

https://bugzilla.opensuse.org/show_bug.cgi?id=977616

https://bugzilla.opensuse.org/show_bug.cgi?id=977617

Plugin Details

Severity: Critical

ID: 91067

File Name: openSUSE-2016-562.nasl

Version: Revision: 2.4

Type: local

Agent: unix

Published: 2016/05/12

Updated: 2016/10/13

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libopenssl-devel, p-cpe:/a:novell:opensuse:libopenssl-devel-32bit, p-cpe:/a:novell:opensuse:libopenssl1_0_0, p-cpe:/a:novell:opensuse:libopenssl1_0_0-32bit, p-cpe:/a:novell:opensuse:libopenssl1_0_0-debuginfo, p-cpe:/a:novell:opensuse:libopenssl1_0_0-debuginfo-32bit, p-cpe:/a:novell:opensuse:openssl, p-cpe:/a:novell:opensuse:openssl-debuginfo, p-cpe:/a:novell:opensuse:openssl-debugsource, cpe:/o:novell:opensuse:13.1

Patch Publication Date: 2016/05/05

Reference Information

CVE: CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109