openSUSE Security Update : libopenssl0_9_8 (openSUSE-2016-563) (DROWN)

Critical Nessus Plugin ID 91068

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.7

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for libopenssl0_9_8 fixes the following issues :

- CVE-2016-2105: EVP_EncodeUpdate overflow (bsc#977614)

- CVE-2016-2106: EVP_EncryptUpdate overflow (bsc#977615)

- CVE-2016-2108: Memory corruption in the ASN.1 encoder (bsc#977617)

- CVE-2016-2109: ASN.1 BIO excessive memory allocation (bsc#976942)

- CVE-2016-0702: Side channel attack on modular exponentiation 'CacheBleed' (bsc#968050)

- bsc#976943: Buffer overrun in ASN1_parse

and updates the package to version 0.9.8zh which collects many other fixes, including security ones.

Solution

Update the affected libopenssl0_9_8 packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=963415

https://bugzilla.opensuse.org/show_bug.cgi?id=968046

https://bugzilla.opensuse.org/show_bug.cgi?id=968048

https://bugzilla.opensuse.org/show_bug.cgi?id=968050

https://bugzilla.opensuse.org/show_bug.cgi?id=968374

https://bugzilla.opensuse.org/show_bug.cgi?id=976942

https://bugzilla.opensuse.org/show_bug.cgi?id=976943

https://bugzilla.opensuse.org/show_bug.cgi?id=977614

https://bugzilla.opensuse.org/show_bug.cgi?id=977615

https://bugzilla.opensuse.org/show_bug.cgi?id=977617

Plugin Details

Severity: Critical

ID: 91068

File Name: openSUSE-2016-563.nasl

Version: 2.7

Type: local

Agent: unix

Published: 2016/05/12

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: Critical

VPR Score: 6.7

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libopenssl0_9_8, p-cpe:/a:novell:opensuse:libopenssl0_9_8-32bit, p-cpe:/a:novell:opensuse:libopenssl0_9_8-debuginfo, p-cpe:/a:novell:opensuse:libopenssl0_9_8-debuginfo-32bit, p-cpe:/a:novell:opensuse:libopenssl0_9_8-debugsource, cpe:/o:novell:opensuse:13.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2016/05/05

Reference Information

CVE: CVE-2015-3197, CVE-2016-0702, CVE-2016-0797, CVE-2016-0799, CVE-2016-0800, CVE-2016-2105, CVE-2016-2106, CVE-2016-2108, CVE-2016-2109