OracleVM 3.3 / 3.4 : gnutls (OVMSA-2017-0054)

High Nessus Plugin ID 99081

Synopsis

The remote OracleVM host is missing one or more security updates.

Description

The remote OracleVM system is missing necessary patches to address critical security updates :

- Upgraded to 2.12.23 to incorporate multiple TLS 1.2 fixes (#1326389, #1326073, #1323215, #1320982, #1328205, #1321112)

- Modified gnutls-serv to accept --sni-hostname (#1333521)

- Modified gnutls-serv to always reply with an alert message (#1327656)

- Removed support for DSA2 as it causes interoperability issues (#1321112)

- Allow sending and receiving certificates which were not in the signature algorithms extension (#1328205)

- Removed support for EXPORT ciphersuites (#1337460)

- Raised the minimum acceptable DH size to 1024 (#1335924)

- Restricted the number of alert that can be received during handshake (#1388730)

- Added fixes for OpenPGP parsing issues (CVE-2017-5337, CVE-2017-5336, CVE-2017-5335)

- The exposed (but internal) crypto back-end registration API is deprecated and no longer functional. The ABI is kept compatible (#1415682)

Solution

Update the affected gnutls / gnutls-utils packages.

See Also

http://www.nessus.org/u?656eaa25

http://www.nessus.org/u?a6fc511e

Plugin Details

Severity: High

ID: 99081

File Name: oraclevm_OVMSA-2017-0054.nasl

Version: 3.5

Type: local

Published: 2017/03/30

Updated: 2019/09/27

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:gnutls, p-cpe:/a:oracle:vm:gnutls-utils, cpe:/o:oracle:vm_server:3.3, cpe:/o:oracle:vm_server:3.4

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/03/29

Vulnerability Publication Date: 2017/03/24

Reference Information

CVE: CVE-2017-5335, CVE-2017-5336, CVE-2017-5337