nessus
via4
|
NASL family | SuSE Local Security Checks | NASL id | SUSE_LIBOPENSSL-DEVEL-6268.NASL | description | Three remote DoS vulnerabilities have been fixed in OpenSSL: a DTLS
epoch record buffer memory DoS (CVE-2009-1377), a DTLS fragment
handling memory DoS (CVE-2009-1378) and a DTLS fragment read after a
free DoS (CVE-2009-1379). | last seen | 2019-01-16 | modified | 2016-12-22 | plugin id | 38923 | published | 2009-05-27 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=38923 | title | openSUSE 10 Security Update : libopenssl-devel (libopenssl-devel-6268) |
NASL family | Ubuntu Local Security Checks | NASL id | UBUNTU_USN-792-1.NASL | description | It was discovered that OpenSSL did not limit the number of DTLS
records it would buffer when they arrived with a future epoch. A
remote attacker could cause a denial of service via memory resource
consumption by sending a large number of crafted requests.
(CVE-2009-1377)
It was discovered that OpenSSL did not properly free memory when
processing DTLS fragments. A remote attacker could cause a denial of
service via memory resource consumption by sending a large number of
crafted requests. (CVE-2009-1378)
It was discovered that OpenSSL did not properly handle certain server
certificates when processing DTLS packets. A remote DTLS server could
cause a denial of service by sending a message containing a specially
crafted server certificate. (CVE-2009-1379)
It was discovered that OpenSSL did not properly handle a DTLS
ChangeCipherSpec packet when it occured before ClientHello. A remote
attacker could cause a denial of service by sending a specially
crafted request. (CVE-2009-1386)
It was discovered that OpenSSL did not properly handle out of sequence
DTLS handshake messages. A remote attacker could cause a denial of
service by sending a specially crafted request. (CVE-2009-1387).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 39534 | published | 2009-06-26 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=39534 | title | Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : openssl vulnerabilities (USN-792-1) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_11_LIBOPENSSL-DEVEL-090522.NASL | description | Three remote DoS vulnerabilities have been fixed in OpenSSL: a DTLS
epoch record buffer memory DoS (CVE-2009-1377), a DTLS fragment
handling memory DoS (CVE-2009-1378) and a DTLS fragment read after a
free DoS. (CVE-2009-1379) | last seen | 2019-01-16 | modified | 2016-12-21 | plugin id | 41424 | published | 2009-09-24 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=41424 | title | SuSE 11 Security Update : OpenSSL (SAT Patch Number 909) |
NASL family | FreeBSD Local Security Checks | NASL id | FREEBSD_PKG_82B55DF84D5A11DE88110030843D3802.NASL | description | Secunia reports :
Some vulnerabilities have been reported in OpenSSL, which can be
exploited by malicious people to cause a DoS.
The library does not limit the number of buffered DTLS records with a
future epoch. This can be exploited to exhaust all available memory
via specially crafted DTLS packets.
An error when processing DTLS messages can be exploited to exhaust all
available memory by sending a large number of out of sequence
handshake messages. | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 38966 | published | 2009-06-01 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=38966 | title | FreeBSD : openssl -- denial of service in DTLS implementation (82b55df8-4d5a-11de-8811-0030843d3802) |
NASL family | CentOS Local Security Checks | NASL id | CENTOS_RHSA-2009-1335.NASL | description | Updated openssl packages that fix several security issues, various
bugs, and add enhancements are now available for Red Hat Enterprise
Linux 5.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL
v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a
full-strength general purpose cryptography library. Datagram TLS
(DTLS) is a protocol based on TLS that is capable of securing datagram
transport (for example, UDP).
Multiple denial of service flaws were discovered in OpenSSL's DTLS
implementation. A remote attacker could use these flaws to cause a
DTLS server to use excessive amounts of memory, or crash on an invalid
memory access or NULL pointer dereference. (CVE-2009-1377,
CVE-2009-1378, CVE-2009-1379, CVE-2009-1386, CVE-2009-1387)
Note: These flaws only affect applications that use DTLS. Red Hat does
not ship any DTLS client or server applications in Red Hat Enterprise
Linux.
An input validation flaw was found in the handling of the BMPString
and UniversalString ASN1 string types in OpenSSL's
ASN1_STRING_print_ex() function. An attacker could use this flaw to
create a specially crafted X.509 certificate that could cause
applications using the affected function to crash when printing
certificate contents. (CVE-2009-0590)
Note: The affected function is rarely used. No application shipped
with Red Hat Enterprise Linux calls this function, for example.
These updated packages also fix the following bugs :
* 'openssl smime -verify -in' verifies the signature of the input file
and the '-verify' switch expects a signed or encrypted input file.
Previously, running openssl on an S/MIME file that was not encrypted
or signed caused openssl to segfault. With this update, the input file
is now checked for a signature or encryption. Consequently, openssl
now returns an error and quits when attempting to verify an
unencrypted or unsigned S/MIME file. (BZ#472440)
* when generating RSA keys, pairwise tests were called even in
non-FIPS mode. This prevented small keys from being generated. With
this update, generating keys in non-FIPS mode no longer calls the
pairwise tests and keys as small as 32-bits can be generated in this
mode. Note: In FIPS mode, pairwise tests are still called and keys
generated in this mode must still be 1024-bits or larger. (BZ#479817)
As well, these updated packages add the following enhancements :
* both the libcrypto and libssl shared libraries, which are part of
the OpenSSL FIPS module, are now checked for integrity on
initialization of FIPS mode. (BZ#475798)
* an issuing Certificate Authority (CA) allows multiple certificate
templates to inherit the CA's Common Name (CN). Because this CN is
used as a unique identifier, each template had to have its own
Certificate Revocation List (CRL). With this update, multiple CRLs
with the same subject name can now be stored in a X509_STORE
structure, with their signature field being used to distinguish
between them. (BZ#457134)
* the fipscheck library is no longer needed for rebuilding the openssl
source RPM. (BZ#475798)
OpenSSL users should upgrade to these updated packages, which resolve
these issues and add these enhancements. | last seen | 2019-01-16 | modified | 2018-11-28 | plugin id | 43785 | published | 2010-01-06 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=43785 | title | CentOS 5 : openssl (CESA-2009:1335) |
NASL family | Slackware Local Security Checks | NASL id | SLACKWARE_SSA_2010-060-02.NASL | description | New openssl packages are available for Slackware 11.0, 12.0, 12.1,
12.2, 13.0, and -current to fix security issues. | last seen | 2019-01-16 | modified | 2018-06-27 | plugin id | 44946 | published | 2010-03-02 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=44946 | title | Slackware 11.0 / 12.0 / 12.1 / 12.2 / 13.0 / current : openssl (SSA:2010-060-02) |
NASL family | Web Servers | NASL id | HPSMH_6_0_0_95.NASL | description | According to its self-reported version number, the HP System
Management Homepage install on the remote host is earlier than
6.0.0.96 / 6.0.0-95. Such versions are potentially affected by the
following vulnerabilities :
- A cross-site scripting (XSS) vulnerability due to a
failure to sanitize UTF-7 encoded input. Browsers are
only affected if encoding is set to auto-select.
(CVE-2008-1468)
- An integer overflow in the libxml2 library that can
result in a heap overflow. (CVE-2008-4226)
- A buffer overflow in the PHP mbstring extension.
(CVE-2008-5557)
- An unspecified XSS in PHP when 'display_errors' is
enabled. (CVE-2008-5814)
- Multiple denial of service vulnerabilities in OpenSSL
DTLS. (CVE-2009-1377, CVE-2009-1378, CVE-2009-1379,
CVE-2009-1386, CVE-2009-1387)
- A cross-site scripting vulnerability due to a failure
to sanitize input to the 'servercert' parameter of
'/proxy/smhu/getuiinfo'. (CVE-2009-4185)
- An unspecified vulnerability that could allow an
attacker to access sensitive information, modify data,
or cause a denial of service. (CVE-2010-1034) | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 46015 | published | 2010-04-27 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=46015 | title | HP System Management Homepage < 6.0.0.96 / 6.0.0-95 Multiple Vulnerabilities |
NASL family | VMware ESX Local Security Checks | NASL id | VMWARE_VMSA-2010-0004.NASL | description | a. vMA and Service Console update for newt to 0.52.2-12.el5_4.1
Newt is a programming library for color text mode, widget based
user interfaces. Newt can be used to add stacked windows, entry
widgets, checkboxes, radio buttons, labels, plain text fields,
scrollbars, etc., to text mode user interfaces.
A heap-based buffer overflow flaw was found in the way newt
processes content that is to be displayed in a text dialog box.
A local attacker could issue a specially crafted text dialog box
display request (direct or via a custom application), leading to a
denial of service (application crash) or, potentially, arbitrary
code execution with the privileges of the user running the
application using the newt library.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-2905 to this issue.
b. vMA and Service Console update for vMA package nfs-utils to
1.0.9-42.el5
The nfs-utils package provides a daemon for the kernel NFS server
and related tools.
It was discovered that nfs-utils did not use tcp_wrappers
correctly. Certain hosts access rules defined in '/etc/hosts.allow'
and '/etc/hosts.deny' may not have been honored, possibly allowing
remote attackers to bypass intended access restrictions.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2008-4552 to this issue.
c. vMA and Service Console package glib2 updated to 2.12.3-4.el5_3.1
GLib is the low-level core library that forms the basis for
projects such as GTK+ and GNOME. It provides data structure
handling for C, portability wrappers, and interfaces for such
runtime functionality as an event loop, threads, dynamic loading,
and an object system.
Multiple integer overflows in glib/gbase64.c in GLib before 2.20
allow context-dependent attackers to execute arbitrary code via a
long string that is converted either from or to a base64
representation.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2008-4316 to this issue.
d. vMA and Service Console update for openssl to 0.9.8e-12.el5
SSL is a toolkit implementing SSL v2/v3 and TLS protocols with full-
strength cryptography world-wide.
Multiple denial of service flaws were discovered in OpenSSL's DTLS
implementation. A remote attacker could use these flaws to cause a
DTLS server to use excessive amounts of memory, or crash on an
invalid memory access or NULL pointer dereference.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the names CVE-2009-1377, CVE-2009-1378,
CVE-2009-1379, CVE-2009-1386, CVE-2009-1387 to these issues.
An input validation flaw was found in the handling of the BMPString
and UniversalString ASN1 string types in OpenSSL's
ASN1_STRING_print_ex() function. An attacker could use this flaw to
create a specially crafted X.509 certificate that could cause
applications using the affected function to crash when printing
certificate contents.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-0590 to this issue.
e. vMA and Service Console package bind updated to 9.3.6-4.P1.el5_4.1
It was discovered that BIND was incorrectly caching responses
without performing proper DNSSEC validation, when those responses
were received during the resolution of a recursive client query
that requested DNSSEC records but indicated that checking should be
disabled. A remote attacker could use this flaw to bypass the DNSSEC
validation check and perform a cache poisoning attack if the target
BIND server was receiving such client queries.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-4022 to this issue.
f. vMA and Service Console package expat updated to 1.95.8-8.3.el5_4.2.
Two buffer over-read flaws were found in the way Expat handled
malformed UTF-8 sequences when processing XML files. A specially-
crafted XML file could cause applications using Expat to fail while
parsing the file.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the names CVE-2009-3560 and CVE-2009-3720 to these
issues.
g. vMA and Service Console package openssh update to 4.3p2-36.el5_4.2
A Red Hat specific patch used in the openssh packages as shipped in
Red Hat Enterprise Linux 5.4 (RHSA-2009:1287) loosened certain
ownership requirements for directories used as arguments for the
ChrootDirectory configuration options. A malicious user that also
has or previously had non-chroot shell access to a system could
possibly use this flaw to escalate their privileges and run
commands as any system user.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-2904 to this issue.
h. vMA and Service Console package ntp updated to
ntp-4.2.2p1-9.el5_4.1.i386.rpm
A flaw was discovered in the way ntpd handled certain malformed NTP
packets. ntpd logged information about all such packets and replied
with an NTP packet that was treated as malformed when received by
another ntpd. A remote attacker could use this flaw to create an NTP
packet reply loop between two ntpd servers through a malformed packet
with a spoofed source IP address and port, causing ntpd on those
servers to use excessive amounts of CPU time and fill disk space with
log messages.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-3563 to this issue.
i. vMA update for package kernel to 2.6.18-164.9.1.el5
Updated vMA package kernel addresses the security issues listed
below.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2009-2849 to the security issue fixed in
kernel 2.6.18-128.2.1
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-2695, CVE-2009-2908, CVE-2009-3228,
CVE-2009-3286, CVE-2009-3547, CVE-2009-3613 to the security issues
fixed in kernel 2.6.18-128.6.1
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-3612, CVE-2009-3620, CVE-2009-3621,
CVE-2009-3726 to the security issues fixed in kernel
2.6.18-128.9.1
j. vMA 4.0 updates for the packages kpartx, libvolume-id,
device-mapper-multipath, fipscheck, dbus, dbus-libs, and ed
kpartx updated to 0.4.7-23.el5_3.4, libvolume-id updated to
095-14.20.el5 device-mapper-multipath package updated to
0.4.7-23.el5_3.4, fipscheck updated to 1.0.3-1.el5, dbus
updated to 1.1.2-12.el5, dbus-libs updated to 1.1.2-12.el5,
and ed package updated to 0.2-39.el5_2.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the names CVE-2008-3916, CVE-2009-1189 and
CVE-2009-0115 to these issues. | last seen | 2019-01-16 | modified | 2018-08-06 | plugin id | 44993 | published | 2010-03-05 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=44993 | title | VMSA-2010-0004 : ESX Service Console and vMA third-party updates |
NASL family | SuSE Local Security Checks | NASL id | SUSE_11_0_LIBOPENSSL-DEVEL-090522.NASL | description | Three remote DoS vulnerabilities have been fixed in OpenSSL: a DTLS
epoch record buffer memory DoS (CVE-2009-1377), a DTLS fragment
handling memory DoS (CVE-2009-1378) and a DTLS fragment read after a
free DoS (CVE-2009-1379). | last seen | 2019-01-16 | modified | 2016-12-21 | plugin id | 40034 | published | 2009-07-21 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=40034 | title | openSUSE Security Update : libopenssl-devel (libopenssl-devel-907) |
NASL family | Scientific Linux Local Security Checks | NASL id | SL_20090902_OPENSSL_ON_SL5_X.NASL | description | CVE-2009-0590 openssl: ASN1 printing crash
CVE-2009-1377 OpenSSL: DTLS epoch record buffer memory DoS
CVE-2009-1378 OpenSSL: DTLS fragment handling memory DoS
CVE-2009-1379 OpenSSL: DTLS pointer use-after-free flaw (DoS)
CVE-2009-1386 openssl: DTLS NULL deref crash on early ChangeCipherSpec
request
CVE-2009-1387 openssl: DTLS out-of-sequence message handling NULL
deref DoS
Multiple denial of service flaws were discovered in OpenSSL's DTLS
implementation. A remote attacker could use these flaws to cause a
DTLS server to use excessive amounts of memory, or crash on an invalid
memory access or NULL pointer dereference. (CVE-2009-1377,
CVE-2009-1378,
CVE-2009-1379, CVE-2009-1386, CVE-2009-1387)
Note: These flaws only affect applications that use DTLS. Scientific
Linux does not ship any DTLS client or server applications.
An input validation flaw was found in the handling of the BMPString
and UniversalString ASN1 string types in OpenSSL's
ASN1_STRING_print_ex() function. An attacker could use this flaw to
create a specially crafted X.509 certificate that could cause
applications using the affected function to crash when printing
certificate contents. (CVE-2009-0590)
Note: The affected function is rarely used. No application shipped
with Scientific Linux calls this function, for example.
These updated packages also fix the following bugs :
- 'openssl smime -verify -in' verifies the signature of
the input file and the '-verify' switch expects a signed
or encrypted input file. Previously, running openssl on
an S/MIME file that was not encrypted or signed caused
openssl to segfault. With this update, the input file is
now checked for a signature or encryption. Consequently,
openssl now returns an error and quits when attempting
to verify an unencrypted or unsigned S/MIME file.
(BZ#472440)
- when generating RSA keys, pairwise tests were called
even in non-FIPS mode. This prevented small keys from
being generated. With this update, generating keys in
non-FIPS mode no longer calls the pairwise tests and
keys as small as 32-bits can be generated in this mode.
Note: In FIPS mode, pairwise tests are still called and
keys generated in this mode must still be 1024-bits or
larger. (BZ#479817)
As well, these updated packages add the following enhancements :
- both the libcrypto and libssl shared libraries, which
are part of the OpenSSL FIPS module, are now checked for
integrity on initialization of FIPS mode. (BZ#475798)
- an issuing Certificate Authority (CA) allows multiple
certificate templates to inherit the CA's Common Name
(CN). Because this CN is used as a unique identifier,
each template had to have its own Certificate Revocation
List (CRL). With this update, multiple CRLs with the
same subject name can now be stored in a X509_STORE
structure, with their signature field being used to
distinguish between them. (BZ#457134)
- the fipscheck library is no longer needed for rebuilding
the openssl source RPM. (BZ#475798) | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 60658 | published | 2012-08-01 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=60658 | title | Scientific Linux Security Update : openssl on SL5.x i386/x86_64 |
NASL family | Fedora Local Security Checks | NASL id | FEDORA_2009-5452.NASL | description | Security update fixing DoS bugs in DTLS code. CVE-2009-1377
CVE-2009-1378 CVE-2009-1379
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2016-12-08 | plugin id | 39476 | published | 2009-06-21 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=39476 | title | Fedora 11 : openssl-0.9.8k-5.fc11 (2009-5452) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2009-1335.NASL | description | Updated openssl packages that fix several security issues, various
bugs, and add enhancements are now available for Red Hat Enterprise
Linux 5.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL
v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a
full-strength general purpose cryptography library. Datagram TLS
(DTLS) is a protocol based on TLS that is capable of securing datagram
transport (for example, UDP).
Multiple denial of service flaws were discovered in OpenSSL's DTLS
implementation. A remote attacker could use these flaws to cause a
DTLS server to use excessive amounts of memory, or crash on an invalid
memory access or NULL pointer dereference. (CVE-2009-1377,
CVE-2009-1378, CVE-2009-1379, CVE-2009-1386, CVE-2009-1387)
Note: These flaws only affect applications that use DTLS. Red Hat does
not ship any DTLS client or server applications in Red Hat Enterprise
Linux.
An input validation flaw was found in the handling of the BMPString
and UniversalString ASN1 string types in OpenSSL's
ASN1_STRING_print_ex() function. An attacker could use this flaw to
create a specially crafted X.509 certificate that could cause
applications using the affected function to crash when printing
certificate contents. (CVE-2009-0590)
Note: The affected function is rarely used. No application shipped
with Red Hat Enterprise Linux calls this function, for example.
These updated packages also fix the following bugs :
* 'openssl smime -verify -in' verifies the signature of the input file
and the '-verify' switch expects a signed or encrypted input file.
Previously, running openssl on an S/MIME file that was not encrypted
or signed caused openssl to segfault. With this update, the input file
is now checked for a signature or encryption. Consequently, openssl
now returns an error and quits when attempting to verify an
unencrypted or unsigned S/MIME file. (BZ#472440)
* when generating RSA keys, pairwise tests were called even in
non-FIPS mode. This prevented small keys from being generated. With
this update, generating keys in non-FIPS mode no longer calls the
pairwise tests and keys as small as 32-bits can be generated in this
mode. Note: In FIPS mode, pairwise tests are still called and keys
generated in this mode must still be 1024-bits or larger. (BZ#479817)
As well, these updated packages add the following enhancements :
* both the libcrypto and libssl shared libraries, which are part of
the OpenSSL FIPS module, are now checked for integrity on
initialization of FIPS mode. (BZ#475798)
* an issuing Certificate Authority (CA) allows multiple certificate
templates to inherit the CA's Common Name (CN). Because this CN is
used as a unique identifier, each template had to have its own
Certificate Revocation List (CRL). With this update, multiple CRLs
with the same subject name can now be stored in a X509_STORE
structure, with their signature field being used to distinguish
between them. (BZ#457134)
* the fipscheck library is no longer needed for rebuilding the openssl
source RPM. (BZ#475798)
OpenSSL users should upgrade to these updated packages, which resolve
these issues and add these enhancements. | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 63892 | published | 2013-01-24 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=63892 | title | RHEL 5 : openssl (RHSA-2009:1335) |
NASL family | Fedora Local Security Checks | NASL id | FEDORA_2009-5423.NASL | description | Security update fixing DoS bugs in DTLS code. CVE-2009-1377
CVE-2009-1378 CVE-2009-1379
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2016-12-08 | plugin id | 39475 | published | 2009-06-21 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=39475 | title | Fedora 9 : openssl-0.9.8g-9.14.fc9 (2009-5423) |
NASL family | Fedora Local Security Checks | NASL id | FEDORA_2009-5412.NASL | description | Security update fixing DoS bugs in DTLS code. CVE-2009-1377
CVE-2009-1378 CVE-2009-1379
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2016-12-08 | plugin id | 39474 | published | 2009-06-21 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=39474 | title | Fedora 10 : openssl-0.9.8g-14.fc10 (2009-5412) |
NASL family | VMware ESX Local Security Checks | NASL id | VMWARE_VMSA-2010-0009.NASL | description | a. Service Console update for COS kernel
Updated COS package 'kernel' addresses the security issues that are
fixed through versions 2.6.18-164.11.1.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-2695, CVE-2009-2908, CVE-2009-3228,
CVE-2009-3286, CVE-2009-3547, CVE-2009-3613 to the security issues
fixed in kernel 2.6.18-164.6.1
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-3612, CVE-2009-3620, CVE-2009-3621,
CVE-2009-3726 to the security issues fixed in kernel 2.6.18-164.9.1.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2007-4567, CVE-2009-4536, CVE-2009-4537,
CVE-2009-4538 to the security issues fixed in kernel 2.6.18-164.10.1
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2006-6304, CVE-2009-2910, CVE-2009-3080,
CVE-2009-3556, CVE-2009-3889, CVE-2009-3939, CVE-2009-4020,
CVE-2009-4021, CVE-2009-4138, CVE-2009-4141, and CVE-2009-4272 to
the security issues fixed in kernel 2.6.18-164.11.1.
b. ESXi userworld update for ntp
The Network Time Protocol (NTP) is used to synchronize the time of
a computer client or server to another server or reference time
source.
A vulnerability in ntpd could allow a remote attacker to cause a
denial of service (CPU and bandwidth consumption) by using
MODE_PRIVATE to send a spoofed (1) request or (2) response packet
that triggers a continuous exchange of MODE_PRIVATE error responses
between two NTP daemons.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-3563 to this issue.
c. Service Console package openssl updated to 0.9.8e-12.el5_4.1
OpenSSL is a toolkit implementing SSL v2/v3 and TLS protocols with
full-strength cryptography world-wide.
A memory leak in the zlib could allow a remote attacker to cause a
denial of service (memory consumption) via vectors that trigger
incorrect calls to the CRYPTO_cleanup_all_ex_data function.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-4355 to this issue.
A vulnerability was discovered which may allow remote attackers to
spoof certificates by using MD2 design flaws to generate a hash
collision in less than brute-force time. NOTE: the scope of this
issue is currently limited because the amount of computation
required is still large.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-2409 to this issue.
This update also includes security fixes that were first addressed
in version openssl-0.9.8e-12.el5.i386.rpm.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the names CVE-2009-0590, CVE-2009-1377, CVE-2009-1378,
CVE-2009-1379, CVE-2009-1386 and CVE-2009-1387 to these issues.
d. Service Console update for krb5 to 1.6.1-36.el5_4.1 and pam_krb5 to
2.2.14-15.
Kerberos is a network authentication protocol. It is designed to
provide strong authentication for client/server applications by
using secret-key cryptography.
Multiple integer underflows in the AES and RC4 functionality in the
crypto library could allow remote attackers to cause a denial of
service (daemon crash) or possibly execute arbitrary code by
providing ciphertext with a length that is too short to be valid.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-4212 to this issue.
The service console package for pam_krb5 is updated to version
pam_krb5-2.2.14-15. This update fixes a flaw found in pam_krb5. In
some non-default configurations (specifically, where pam_krb5 would
be the first module to prompt for a password), a remote attacker
could use this flaw to recognize valid usernames, which would aid a
dictionary-based password guess attack.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-1384 to this issue.
e. Service Console package bind updated to 9.3.6-4.P1.el5_4.2
BIND (Berkeley Internet Name Daemon) is by far the most widely used
Domain Name System (DNS) software on the Internet.
A vulnerability was discovered which could allow remote attacker to
add the Authenticated Data (AD) flag to a forged NXDOMAIN response
for an existing domain.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0097 to this issue.
A vulnerability was discovered which could allow remote attackers
to conduct DNS cache poisoning attacks by receiving a recursive
client query and sending a response that contains CNAME or DNAME
records, which do not have the intended validation before caching.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0290 to this issue.
A vulnerability was found in the way that bind handles out-of-
bailiwick data accompanying a secure response without re-fetching
from the original source, which could allow remote attackers to
have an unspecified impact via a crafted response.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0382 to this issue.
NOTE: ESX does not use the BIND name service daemon by default.
f. Service Console package gcc updated to 3.2.3-60
The GNU Compiler Collection includes front ends for C, C++,
Objective-C, Fortran, Java, and Ada, as well as libraries for these
languages
GNU Libtool's ltdl.c attempts to open .la library files in the
current working directory. This could allow a local user to gain
privileges via a Trojan horse file. The GNU C Compiler collection
(gcc) provided in ESX contains a statically linked version of the
vulnerable code, and is being replaced.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-3736 to this issue.
g. Service Console package gzip update to 1.3.3-15.rhel3
gzip is a software application used for file compression
An integer underflow in gzip's unlzw function on 64-bit platforms
may allow a remote attacker to trigger an array index error
leading to a denial of service (application crash) or possibly
execute arbitrary code via a crafted LZW compressed file.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0001 to this issue.
h. Service Console package sudo updated to 1.6.9p17-6.el5_4
Sudo (su 'do') allows a system administrator to delegate authority
to give certain users (or groups of users) the ability to run some
(or all) commands as root or another user while providing an audit
trail of the commands and their arguments.
When a pseudo-command is enabled, sudo permits a match between the
name of the pseudo-command and the name of an executable file in an
arbitrary directory, which allows local users to gain privileges
via a crafted executable file.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0426 to this issue.
When the runas_default option is used, sudo does not properly set
group memberships, which allows local users to gain privileges via
a sudo command.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0427 to this issue. | last seen | 2019-01-16 | modified | 2018-08-06 | plugin id | 46765 | published | 2010-06-01 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=46765 | title | VMSA-2010-0009 : ESXi ntp and ESX Service Console third-party updates |
NASL family | Web Servers | NASL id | OPENSSL_0_9_8L.NASL | description | According to its banner, the remote server is running a version of
OpenSSL that is earlier than 0.9.8l. As such, it may be affected by
multiple vulnerabilities :
- A remote attacker could crash the server by sending
malformed ASN.1 data. This flaw only affects some
architectures, Win64 and other unspecified platforms.
(CVE-2009-0789)
- A remote attacker could saturate the server by sending
a big number of 'future epoch' DTLS records.
(CVE-2009-1377)
- A remote attacker could saturate the server by sending
duplicate DTLS records, or DTLS records with too big
sequence numbers. (CVE-2009-1378)
- A remote attacker could spoof certificates by computing
MD2 hash collisions. (CVE-2009-2409) | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 17765 | published | 2012-01-04 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=17765 | title | OpenSSL < 0.9.8l Multiple Vulnerabilities |
NASL family | Mandriva Local Security Checks | NASL id | MANDRIVA_MDVSA-2009-310.NASL | description | Multiple security vulnerabilities has been identified and fixed in
OpenSSL :
The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and
earlier 0.9.8 versions allows remote attackers to cause a denial of
service (memory consumption) via a large series of future epoch DTLS
records that are buffered in a queue, aka DTLS record buffer
limitation bug. (CVE-2009-1377)
Multiple memory leaks in the dtls1_process_out_of_seq_message function
in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow
remote attackers to cause a denial of service (memory consumption) via
DTLS records that (1) are duplicates or (2) have sequence numbers much
greater than current sequence numbers, aka DTLS fragment handling
memory leak. (CVE-2009-1378)
Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment
function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote
attackers to cause a denial of service (openssl s_client crash) and
possibly have unspecified other impact via a DTLS packet, as
demonstrated by a packet from a server that uses a crafted server
certificate (CVE-2009-1379).
ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause
a denial of service (NULL pointer dereference and daemon crash) via a
DTLS ChangeCipherSpec packet that occurs before ClientHello
(CVE-2009-1386).
The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in
OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial
of service (NULL pointer dereference and daemon crash) via an
out-of-sequence DTLS handshake message, related to a fragment bug.
(CVE-2009-1387)
The NSS library library before 3.12.3, as used in Firefox; GnuTLS
before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other
products support MD2 with X.509 certificates, which might allow remote
attackers to spooof certificates by using MD2 design flaws to generate
a hash collision in less than brute-force time. NOTE: the scope of
this issue is currently limited because the amount of computation
required is still large (CVE-2009-2409).
A regression was found with the self signed certificate signatures
checking after applying the fix for CVE-2009-2409. An upstream patch
has been applied to address this issue.
Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers
The updated packages have been patched to prevent this. | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 42996 | published | 2009-12-04 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=42996 | title | Mandriva Linux Security Advisory : openssl (MDVSA-2009:310) |
NASL family | Gentoo Local Security Checks | NASL id | GENTOO_GLSA-200912-01.NASL | description | The remote host is affected by the vulnerability described in GLSA-200912-01
(OpenSSL: Multiple vulnerabilities)
Multiple vulnerabilities have been reported in OpenSSL:
Marsh Ray of PhoneFactor and Martin Rex of SAP independently
reported that the TLS protocol does not properly handle session
renegotiation requests (CVE-2009-3555).
The MD2 hash algorithm is no longer considered to be
cryptographically strong, as demonstrated by Dan Kaminsky. Certificates
using this algorithm are no longer accepted (CVE-2009-2409).
Daniel Mentz and Robin Seggelmann reported the following
vulnerabilities related to DTLS: A use-after-free flaw (CVE-2009-1379)
and a NULL pointer dereference (CVE-2009-1387) in the
dtls1_retrieve_buffered_fragment() function in src/d1_both.c, multiple
memory leaks in the dtls1_process_out_of_seq_message() function in
src/d1_both.c (CVE-2009-1378), and a processing error related to a
large amount of DTLS records with a future epoch in the
dtls1_buffer_record() function in ssl/d1_pkt.c
(CVE-2009-1377).
Impact :
A remote unauthenticated attacker, acting as a Man in the Middle, could
inject arbitrary plain text into a TLS session, possibly leading to the
ability to send requests as if authenticated as the victim. A remote
attacker could furthermore send specially crafted DTLS packages to a
service using OpenSSL for DTLS support, possibly resulting in a Denial
of Service. Also, a remote attacker might be able to create rogue
certificates, facilitated by a MD2 collision. NOTE: The amount of
computation needed for this attack is still very large.
Workaround :
There is no known workaround at this time. | last seen | 2019-01-16 | modified | 2018-07-11 | plugin id | 42968 | published | 2009-12-02 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=42968 | title | GLSA-200912-01 : OpenSSL: Multiple vulnerabilities |
NASL family | VMware ESX Local Security Checks | NASL id | VMWARE_VMSA-2010-0009_REMOTE.NASL | description | The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by multiple vulnerabilities, including
remote code execution vulnerabilities, in several components and
third-party libraries :
- libpng
- VMnc Codec
- vmrun
- VMware Remote Console (VMrc)
- VMware Tools
- vmware-authd | last seen | 2019-01-16 | modified | 2018-08-06 | plugin id | 89740 | published | 2016-03-08 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=89740 | title | VMware ESX / ESXi Third-Party Libraries and Components (VMSA-2010-0009) (remote check) |
NASL family | VMware ESX Local Security Checks | NASL id | VMWARE_VMSA-2010-0004_REMOTE.NASL | description | The remote VMware ESX host is missing a security-related patch. It is,
therefore, affected by multiple vulnerabilities, including remote code
execution vulnerabilities, in several third-party components and
libraries :
- bind
- expat
- glib2
- Kernel
- newt
- nfs-utils
- NTP
- OpenSSH
- OpenSSL | last seen | 2019-01-16 | modified | 2018-08-06 | plugin id | 89737 | published | 2016-03-08 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=89737 | title | VMware ESX Third-Party Libraries Multiple Vulnerabilities (VMSA-2010-0004) (remote check) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_OPENSSL-6267.NASL | description | Three remote DoS vulnerabilities have been fixed in OpenSSL: a DTLS
epoch record buffer memory DoS (CVE-2009-1377), a DTLS fragment
handling memory DoS (CVE-2009-1378) and a DTLS fragment read after a
free DoS. (CVE-2009-1379) | last seen | 2019-01-16 | modified | 2016-12-22 | plugin id | 41572 | published | 2009-09-24 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=41572 | title | SuSE 10 Security Update : OpenSSL (ZYPP Patch Number 6267) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_11_1_LIBOPENSSL-DEVEL-090522.NASL | description | Three remote DoS vulnerabilities have been fixed in OpenSSL: a DTLS
epoch record buffer memory DoS (CVE-2009-1377), a DTLS fragment
handling memory DoS (CVE-2009-1378) and a DTLS fragment read after a
free DoS (CVE-2009-1379). | last seen | 2019-01-16 | modified | 2016-12-21 | plugin id | 40261 | published | 2009-07-21 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=40261 | title | openSUSE Security Update : libopenssl-devel (libopenssl-devel-907) |
NASL family | Mandriva Local Security Checks | NASL id | MANDRIVA_MDVSA-2009-120.NASL | description | Multiple security vulnerabilities has been identified and fixed in
OpenSSL :
The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and
earlier 0.9.8 versions allows remote attackers to cause a denial of
service (memory consumption) via a large series of future epoch DTLS
records that are buffered in a queue, aka DTLS record buffer
limitation bug. (CVE-2009-1377)
Multiple memory leaks in the dtls1_process_out_of_seq_message function
in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow
remote attackers to cause a denial of service (memory consumption) via
DTLS records that (1) are duplicates or (2) have sequence numbers much
greater than current sequence numbers, aka DTLS fragment handling
memory leak. (CVE-2009-1378)
The updated packages have been patched to prevent this. | last seen | 2019-01-16 | modified | 2018-07-19 | plugin id | 38864 | published | 2009-05-22 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=38864 | title | Mandriva Linux Security Advisory : openssl (MDVSA-2009:120) |
|