ID CVE-2018-0734
Summary The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
References
Vulnerable Configurations
  • OpenSSL Project OpenSSL 1.0.2
    cpe:2.3:a:openssl:openssl:1.0.2
  • OpenSSL Project OpenSSL 1.0.2-beta1
    cpe:2.3:a:openssl:openssl:1.0.2:beta1
  • OpenSSL 1.0.2 Beta 2
    cpe:2.3:a:openssl:openssl:1.0.2:beta2
  • OpenSSL 1.0.2 Beta 3
    cpe:2.3:a:openssl:openssl:1.0.2:beta3
  • OpenSSL OpenSSL 1.0.2a
    cpe:2.3:a:openssl:openssl:1.0.2a
  • OpenSSL Project OpenSSL 1.0.2b
    cpe:2.3:a:openssl:openssl:1.0.2b
  • OpenSSL Project OpenSSL 1.0.2c
    cpe:2.3:a:openssl:openssl:1.0.2c
  • OpenSSL OpenSSL 1.0.2d
    cpe:2.3:a:openssl:openssl:1.0.2d
  • OpenSSL 1.0.2e
    cpe:2.3:a:openssl:openssl:1.0.2e
  • OpenSSL 1.0.2f
    cpe:2.3:a:openssl:openssl:1.0.2f
  • OpenSSL Project 1.0.2g
    cpe:2.3:a:openssl:openssl:1.0.2g
  • OpenSSL 1.0.2h
    cpe:2.3:a:openssl:openssl:1.0.2h
  • OpenSSL Project OpenSSL 1.0.2i
    cpe:2.3:a:openssl:openssl:1.0.2i
  • OpenSSL1.0.2j
    cpe:2.3:a:openssl:openssl:1.0.2j
  • OpenSSL 1.0.2k
    cpe:2.3:a:openssl:openssl:1.0.2k
  • OpenSSL 1.0.2l
    cpe:2.3:a:openssl:openssl:1.0.2l
  • OpenSSL 1.0.2m
    cpe:2.3:a:openssl:openssl:1.0.2m
  • OpenSSL Project OpenSSL 1.0.2n
    cpe:2.3:a:openssl:openssl:1.0.2n
  • OpenSSL Project OpenSSL 1.0.2o
    cpe:2.3:a:openssl:openssl:1.0.2o
  • OpenSSL Project OpenSSL 1.0.2p
    cpe:2.3:a:openssl:openssl:1.0.2p
  • OpenSSL Project OpenSSL 1.1.0
    cpe:2.3:a:openssl:openssl:1.1.0
  • OpenSSL Project OpenSSL 1.1.0
    cpe:2.3:a:openssl:openssl:1.1.0
  • OpenSSL Project OpenSSL 1.1.0 Pre1
    cpe:2.3:a:openssl:openssl:1.1.0:pre1
  • OpenSSL Project OpenSSL 1.1.0 Pre2
    cpe:2.3:a:openssl:openssl:1.1.0:pre2
  • OpenSSL Project OpenSSL 1.1.0 Pre3
    cpe:2.3:a:openssl:openssl:1.1.0:pre3
  • OpenSSL Project OpenSSL 1.1.0 Pre4
    cpe:2.3:a:openssl:openssl:1.1.0:pre4
  • OpenSSL Project OpenSSL 1.1.0 Pre5
    cpe:2.3:a:openssl:openssl:1.1.0:pre5
  • OpenSSL Project OpenSSL 1.1.0 Pre6
    cpe:2.3:a:openssl:openssl:1.1.0:pre6
  • OpenSSL Project OpenSSL 1.1.0a
    cpe:2.3:a:openssl:openssl:1.1.0a
  • OpenSSL Project OpenSSL 1.1.0b
    cpe:2.3:a:openssl:openssl:1.1.0b
  • OpenSSL Project OpenSSL 1.1.0c
    cpe:2.3:a:openssl:openssl:1.1.0c
  • OpenSSL Project OpenSSL 1.1.0d
    cpe:2.3:a:openssl:openssl:1.1.0d
  • OpenSSL Project OpenSSL 1.1.0e
    cpe:2.3:a:openssl:openssl:1.1.0e
  • OpenSSL Project OpenSSL 1.1.0f
    cpe:2.3:a:openssl:openssl:1.1.0f
  • OpenSSL 1.1.0g
    cpe:2.3:a:openssl:openssl:1.1.0g
  • OpenSSL Project OpenSSL 1.1.0h
    cpe:2.3:a:openssl:openssl:1.1.0h
  • OpenSSL Project OpenSSL 1.1.0i
    cpe:2.3:a:openssl:openssl:1.1.0i
  • OpenSSL Project OpenSSL 1.1.1
    cpe:2.3:a:openssl:openssl:1.1.1
  • Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:14.04:-:-:-:lts
  • Canonical Ubuntu Linux 16.04 LTS (Long-Term Support)
    cpe:2.3:o:canonical:ubuntu_linux:16.04:-:-:-:lts
  • Canonical Ubuntu Linux 18.04 LTS Edition
    cpe:2.3:o:canonical:ubuntu_linux:18.04:-:-:-:lts
  • Canonical Ubuntu Linux 18.10
    cpe:2.3:o:canonical:ubuntu_linux:18.10
  • Debian Linux 9.0
    cpe:2.3:o:debian:debian_linux:9.0
  • Nodejs Node.js 6.9.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.9.0:-:-:-:lts
  • Nodejs Node.js 6.9.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.9.1:-:-:-:lts
  • Nodejs Node.js 6.9.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.9.2:-:-:-:lts
  • Nodejs Node.js 6.9.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.9.3:-:-:-:lts
  • Nodejs Node.js 6.9.4 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.9.4:-:-:-:lts
  • Nodejs Node.js 6.9.5 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.9.5:-:-:-:lts
  • Nodejs Node.js 6.10.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.10.0:-:-:-:lts
  • Nodejs Node.js 6.10.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.10.1:-:-:-:lts
  • Nodejs Node.js 6.10.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.10.3:-:-:-:lts
  • Nodejs Node.js 6.11.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.11.2:-:-:-:lts
  • Nodejs Node.js 6.11.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.11.3:-:-:-:lts
  • Nodejs Node.js 6.11.4 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.11.4:-:-:-:lts
  • Nodejs Node.js 6.11.5 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.11.5:-:-:-:lts
  • Nodejs Node.js 6.12.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.12.0:-:-:-:lts
  • Nodejs Node.js 6.12.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.12.1:-:-:-:lts
  • Nodejs Node.js 6.12.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.12.2:-:-:-:lts
  • Nodejs Node.js 6.12.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.12.3:-:-:-:lts
  • Nodejs Node.js 6.13.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.13.0:-:-:-:lts
  • Nodejs Node.js 6.13.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.13.1:-:-:-:lts
  • Nodejs Node.js 6.14.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.14.0:-:-:-:lts
  • Nodejs Node.js 6.14.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.14.1:-:-:-:lts
  • Nodejs Node.js 6.14.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.14.2:-:-:-:lts
  • Nodejs Node.js 6.14.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.14.3:-:-:-:lts
  • Nodejs Node.js 6.14.4 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.14.4:-:-:-:lts
  • Nodejs Node.js 6.15.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.15.0:-:-:-:lts
  • Nodejs Node.js 6.15.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:6.15.1:-:-:-:lts
  • Nodejs Node.js 8.9.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.9.0:-:-:-:lts
  • Nodejs Node.js 8.9.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.9.1:-:-:-:lts
  • Nodejs Node.js 8.9.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.9.2:-:-:-:lts
  • Nodejs Node.js 8.9.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.9.3:-:-:-:lts
  • Nodejs Node.js 8.9.4 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.9.4:-:-:-:lts
  • Nodejs Node.js 8.10.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.10.0:-:-:-:lts
  • Nodejs Node.js 8.11.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.11.1:-:-:-:lts
  • Nodejs Node.js 8.11.2 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.11.2:-:-:-:lts
  • Nodejs Node.js 8.11.3 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.11.3:-:-:-:lts
  • Nodejs Node.js 8.11.4 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.11.4:-:-:-:lts
  • Nodejs Node.js 8.12.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.12.0:-:-:-:lts
  • Nodejs Node.js 8.13.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.13.0:-:-:-:lts
  • Nodejs Node.js 8.14.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:8.14.0:-:-:-:lts
  • Nodejs Node.js 10.13.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:10.13.0:-:-:-:lts
  • Nodejs Node.js 10.14.0 LTS Edition
    cpe:2.3:a:nodejs:node.js:10.14.0:-:-:-:lts
  • Nodejs Node.js 10.14.1 LTS Edition
    cpe:2.3:a:nodejs:node.js:10.14.1:-:-:-:lts
  • Nodejs Node.js 11.0.0
    cpe:2.3:a:nodejs:node.js:11.0.0
  • Nodejs Node.js 11.1.0
    cpe:2.3:a:nodejs:node.js:11.1.0
  • Nodejs Node.js 11.2.0
    cpe:2.3:a:nodejs:node.js:11.2.0
  • Nodejs Node.js 11.3.0
    cpe:2.3:a:nodejs:node.js:11.3.0
  • Nodejs Node.js 11.4.0
    cpe:2.3:a:nodejs:node.js:11.4.0
  • cpe:2.3:o:netapp:cn1610_firmware
    cpe:2.3:o:netapp:cn1610_firmware
  • cpe:2.3:h:netapp:cn1610
    cpe:2.3:h:netapp:cn1610
  • cpe:2.3:a:netapp:cloud_backup
    cpe:2.3:a:netapp:cloud_backup
  • cpe:2.3:a:netapp:oncommand_unified_manager
    cpe:2.3:a:netapp:oncommand_unified_manager
  • cpe:2.3:a:netapp:santricity_smi-s_provider
    cpe:2.3:a:netapp:santricity_smi-s_provider
  • cpe:2.3:a:netapp:snapcenter
    cpe:2.3:a:netapp:snapcenter
  • cpe:2.3:a:netapp:steelstore
    cpe:2.3:a:netapp:steelstore
  • cpe:2.3:a:netapp:storage_automation_store
    cpe:2.3:a:netapp:storage_automation_store
  • Oracle API Gateway 11.1.2.4.0
    cpe:2.3:a:oracle:api_gateway:11.1.2.4.0
  • cpe:2.3:a:oracle:e-business_suite_technology_stack:0.9.8
    cpe:2.3:a:oracle:e-business_suite_technology_stack:0.9.8
  • cpe:2.3:a:oracle:e-business_suite_technology_stack:1.0.0
    cpe:2.3:a:oracle:e-business_suite_technology_stack:1.0.0
  • cpe:2.3:a:oracle:e-business_suite_technology_stack:1.0.1
    cpe:2.3:a:oracle:e-business_suite_technology_stack:1.0.1
  • cpe:2.3:a:oracle:enterprise_manager_base_platform:12.1.0.5.0
    cpe:2.3:a:oracle:enterprise_manager_base_platform:12.1.0.5.0
  • cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0.0
    cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0.0
  • cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0.0
    cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0.0
  • Oracle Enterprise Manager Ops Center 12.3.3
    cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3
  • Oracle PeopleSoft Enterprise PeopleTools 8.55
    cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55
  • Oracle PeopleSoft Enterprise PeopleTools 8.56
    cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56
  • cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57
    cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57
  • cpe:2.3:a:oracle:primavera_p6_professional_project_management:8.4
    cpe:2.3:a:oracle:primavera_p6_professional_project_management:8.4
  • cpe:2.3:a:oracle:primavera_p6_professional_project_management:15.1
    cpe:2.3:a:oracle:primavera_p6_professional_project_management:15.1
  • cpe:2.3:a:oracle:primavera_p6_professional_project_management:15.2
    cpe:2.3:a:oracle:primavera_p6_professional_project_management:15.2
  • cpe:2.3:a:oracle:primavera_p6_professional_project_management:16.1
    cpe:2.3:a:oracle:primavera_p6_professional_project_management:16.1
  • cpe:2.3:a:oracle:primavera_p6_professional_project_management:16.2
    cpe:2.3:a:oracle:primavera_p6_professional_project_management:16.2
  • cpe:2.3:a:oracle:primavera_p6_professional_project_management:18.8
    cpe:2.3:a:oracle:primavera_p6_professional_project_management:18.8
  • cpe:2.3:a:oracle:tuxedo:12.1.1.0.0
    cpe:2.3:a:oracle:tuxedo:12.1.1.0.0
CVSS
Base: 4.3
Impact:
Exploitability:
CWE CWE-320
CAPEC
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2019-84.NASL
    description This update for virtualbox version 5.2.24 fixes the following issues : Update fixes multiple vulnerabilities : CVE-2019-2500, CVE-2019-2524, CVE-2019-2552, CVE-2018-3309, CVE-2019-2520 CVE-2019-2521, CVE-2019-2522, CVE-2019-2523, CVE-2019-2526, CVE-2019-2548 CVE-2018-11763, CVE-2019-2511, CVE-2019-2508, CVE-2019-2509, CVE-2019-2527 CVE-2019-2450, CVE-2019-2451, CVE-2019-2555, CVE-2019-2554, CVE-2019-2556 CVE-2018-11784, CVE-2018-0734, CVE-2019-2525, CVE-2019-2446, CVE-2019-2448 CVE-2019-2501, CVE-2019-2504, CVE-2019-2505, CVE-2019-2506, and CVE-2019-2553 (boo#1122212). Non-security issues fixed : - Linux Additions: fix for building vboxvideo on EL 7.6 standard kernel, contributed by Robert Conde - USB: fixed a problem causing failures attaching SuperSpeed devices which report USB version 3.1 (rather than 3.0) on Windows hosts - Audio: added support for surround speaker setups used by Windows 10 Build 1809 - Linux hosts: fixed conflict between Debian and Oracle build desktop files - Linux guests: fixed building drivers on SLES 12.4 - Linux guests: fixed building shared folder driver with older kernels
    last seen 2019-02-21
    modified 2019-01-28
    plugin id 121411
    published 2019-01-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121411
    title openSUSE Security Update : virtualbox (openSUSE-2019-84)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4355.NASL
    description Several local side channel attacks and a denial of service via large Diffie-Hellman parameters were discovered in OpenSSL, a Secure Sockets Layer toolkit.
    last seen 2019-02-21
    modified 2018-12-20
    plugin id 119792
    published 2018-12-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119792
    title Debian DSA-4355-1 : openssl1.0 - security update
  • NASL family Misc.
    NASL id VIRTUALBOX_JAN_2019_CPU.NASL
    description The version of Oracle VM VirtualBox running on the remote host is 5.2.x prior to 5.2.24 or 6.0.x prior to 6.0.2. It is, therefore, affected by multiple vulnerabilities as noted in the January 2018 Critical Patch Update advisory : - A denial of service vulnerability in the bundled third-party component OpenSSL library's DSA signature algorithm that renders it vulnerable to a timing side channel attack. An attacker could leverage this vulnerability to recover the private key. (CVE-2018-0734) - Multiple unspecified vulnerabilities in the Core component of Oracle VirtualBox could allow an authenticated, local attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. (CVE-2018-3309, CVE-2019-2500, CVE-2019-2520, CVE-2019-2521, CVE-2019-2522, CVE-2019-2523, CVE-2019-2524, CVE-2019-2526, CVE-2019-2548, CVE-2019-2552) - Multiple unspecified vulnerabilities in the Core component of Oracle VirtualBox could allow an authenticated, local attacker with logon to the infrastructure where Oracle VM VirtualBox executes to potentially expose critical or confidential data. (CVE-2019-2446, CVE-2019-2448, CVE-2019-2450, CVE-2019-2451, CVE-2019-2501, CVE-2019-2504, CVE-2019-2505, CVE-2019-2506, CVE-2019-2525, CVE-2019-2553, CVE-2019-2554, CVE-2019-2555, CVE-2019-2556) - Multiple denial of service vulnerabilities in the Core component of Oracle VirtualBox could allow an authenticated, local attacker with logon to the infrastructure where Oracle VM VirtualBox executes to cause a denial of service condition. (CVE-2019-2508, CVE-2019-2509, CVE-2019-2527) - An denial of service vulnerabilities with the SOAP protocol in the Core component of Oracle VirtualBox could allow an unauthenticated, remote attacker, to potentially a denial of service condition. (CVE-2019-2511) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-18
    plugin id 121247
    published 2019-01-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121247
    title Oracle VM VirtualBox 5.2.x < 5.2.24 / 6.0.x < 6.0.2 (Jan 2019 CPU)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-4068-1.NASL
    description This update for compat-openssl098 fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018). Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 119646
    published 2018-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119646
    title SUSE SLED12 / SLES12 Security Update : compat-openssl098 (SUSE-SU-2018:4068-1)
  • NASL family Misc.
    NASL id NESSUS_TNS_2018_17.NASL
    description According to its self-reported version, the Tenable Nessus application running on the remote host is prior to 7.1.4. It is, therefore, affected by multiple vulnerabilities: - Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's key handling during a TLS handshake that causes a denial of service vulnerability due to key handling during a TLS handshake. (CVE-2018-0732) - Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's DSA signature algorithm that renders it vulnerable to a timing side channel attack. An attacker could leverage this vulnerability to recover the private key. (CVE-2018-0734) - Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's RSA Key generation algorithm that allows a cache timing side channel attack to recover the private key. (CVE-2018-0737) - Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's Simultaneous Multithreading (SMT) architectures which render it vulnerable to side-channel leakage. This issue is known as 'PortSmash'. An attacker could possibly use this issue to perform a timing side-channel attack and recover private keys. (CVE-2018-5407)
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 120198
    published 2019-01-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120198
    title Tenable Nessus < 7.1.4 Multiple Vulnerabilities (TNS-2018-17)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-1529.NASL
    description This update for compat-openssl098 fixes the following issues : Security issues fixed : - CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). - CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). - CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018). - Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789). This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2019-02-21
    modified 2018-12-13
    plugin id 119641
    published 2018-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119641
    title openSUSE Security Update : compat-openssl098 (openSUSE-2018-1529)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-4274-1.NASL
    description This update for openssl fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018). Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-28
    plugin id 119937
    published 2018-12-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119937
    title SUSE SLES11 Security Update : openssl (SUSE-SU-2018:4274-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-3864-1.NASL
    description This update for openssl fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). CVE-2018-0737: Corrected the current error detection of the current fix (bsc#1106197). CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018). Add missing timing side channel patch for DSA signature generation (bsc#1113742). Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789). Non-security issues fixed: Added openssl(cli) so that the packages that required the openssl binary can require this instead of the new openssl meta package (bsc#1101470). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-23
    plugin id 119116
    published 2018-11-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119116
    title SUSE SLES12 Security Update : openssl (SUSE-SU-2018:3864-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-3866-1.NASL
    description This update for openssl fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). Add missing timing side channel patch for DSA signature generation (bsc#1113742). Non-security issues fixed: Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119117
    published 2018-11-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119117
    title SUSE SLED12 / SLES12 Security Update : openssl (SUSE-SU-2018:3866-1)
  • NASL family Misc.
    NASL id NODEJS_2018_NOV.NASL
    description The version of Node.js installed on the remote host is 6.x prior to 6.15.0, 8.x prior to 8.14.0 or 10.x prior to 10.14.0 or 11.x prior to 11.3.0. Therefore, it is affected by multiple vulnerabilities. - OpenSSL Timing vulnerability in DSA signature generation (CVE-2018-0734). - OpenSSL Timing vulnerability in ECDSA signature generation (CVE-2018-0735). - OpenSSL Microarchitecture timing vulnerability in ECC scalar multiplication (CVE-2018-5407). - Debugger port 5858 listens on any interface by default CVE-2018-12120). - Denial of Service with large HTTP headers (CVE-2018-12121). - Slowloris HTTP Denial of Service (CVE-2018-12122). - Hostname spoofing in URL parser for javascript protocol (CVE-2018-12123). - HTTP request splitting (CVE-2018-12116). Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-12-28
    plugin id 119938
    published 2018-12-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119938
    title Node.js multiple vulnerabilities (November 2018 Security Releases).
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-3989-1.NASL
    description This update for openssl-1_0_0 fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). Add missing timing side channel patch for DSA signature generation (bsc#1113742). Non-security issues fixed: Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209). Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119457
    published 2018-12-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119457
    title SUSE SLED12 / SLES12 Security Update : openssl-1_0_0 (SUSE-SU-2018:3989-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-3945-1.NASL
    description This update for openssl-1_1 fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-0735: Fixed timing vulnerability in ECDSA signature generation (bsc#1113651). Non-security issues fixed: Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119299
    published 2018-11-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119299
    title SUSE SLED12 / SLES12 Security Update : openssl-1_1 (SUSE-SU-2018:3945-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2019-0395-1.NASL
    description This update for nodejs6 to version 6.16.0 fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed a timing vulnerability in the DSA signature generation (bsc#1113652) CVE-2018-5407: Fixed a hyperthread port content side channel attack (aka 'PortSmash') (bsc#1113534) CVE-2018-12120: Fixed that the debugger listens on any interface by default (bsc#1117625) CVE-2018-12121: Fixed a denial of Service with large HTTP headers (bsc#1117626) CVE-2018-12122: Fixed the 'Slowloris' HTTP Denial of Service (bsc#1117627) CVE-2018-12116: Fixed HTTP request splitting (bsc#1117630) CVE-2018-12123: Fixed hostname spoofing in URL parser for JavaScript protocol (bsc#1117629) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-15
    plugin id 122230
    published 2019-02-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=122230
    title SUSE SLES12 Security Update : nodejs6 (SUSE-SU-2019:0395-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2019-A8FFCFF7EE.NASL
    description Minor update to version 1.1.1a with bug fixes and low impact security fixes. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 121239
    published 2019-01-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121239
    title Fedora 29 : 1:openssl (2019-a8ffcff7ee)
  • NASL family Amazon Linux Local Security Checks
    NASL id AL2_ALAS-2019-1153.NASL
    description The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. (CVE-2018-0734)
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 121366
    published 2019-01-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121366
    title Amazon Linux 2 : openssl (ALAS-2019-1153)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3840-1.NASL
    description Samuel Weiser discovered that OpenSSL incorrectly handled DSA signing. An attacker could possibly use this issue to perform a timing side-channel attack and recover private DSA keys. (CVE-2018-0734) Samuel Weiser discovered that OpenSSL incorrectly handled ECDSA signing. An attacker could possibly use this issue to perform a timing side-channel attack and recover private ECDSA keys. This issue only affected Ubuntu 18.04 LTS and Ubuntu 18.10. (CVE-2018-0735) Billy Bob Brumley, Cesar Pereida Garcia, Sohaib ul Hassan, Nicola Tuveri, and Alejandro Cabrera Aldaya discovered that Simultaneous Multithreading (SMT) architectures are vulnerable to side-channel leakage. This issue is known as 'PortSmash'. An attacker could possibly use this issue to perform a timing side-channel attack and recover private keys. (CVE-2018-5407). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119497
    published 2018-12-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119497
    title Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 18.10 : openssl, openssl1.0 vulnerabilities (USN-3840-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2019-138.NASL
    description This update for mysql-community-server to version 5.6.43 fixes the following issues : Security issues fixed : - CVE-2019-2534, CVE-2019-2529, CVE-2019-2482, CVE-2019-2455, CVE-2019-2503, CVE-2019-2537, CVE-2019-2481, CVE-2019-2507, CVE-2019-2531, CVE-2018-0734 (boo#1113652, boo#1122198)
    last seen 2019-02-21
    modified 2019-02-06
    plugin id 121608
    published 2019-02-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121608
    title openSUSE Security Update : mysql-community-server (openSUSE-2019-138)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2019-0117-1.NASL
    description This update for nodejs4 fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed a timing vulnerability in the DSA signature generation (bsc#1113652) CVE-2018-5407: Fixed a hyperthread port content side channel attack (aka 'PortSmash') (bsc#1113534) CVE-2018-12120: Fixed that the debugger listens on any interface by default (bsc#1117625) CVE-2018-12121: Fixed a denial of Service with large HTTP headers (bsc#1117626) CVE-2018-12122: Fixed the 'Slowloris' HTTP Denial of Service (bsc#1117627) CVE-2018-12116: Fixed HTTP request splitting (bsc#1117630) CVE-2018-12123: Fixed hostname spoofing in URL parser for JavaScript protocol (bsc#1117629) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-22
    plugin id 121292
    published 2019-01-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121292
    title SUSE SLES12 Security Update : nodejs4 (SUSE-SU-2019:0117-1)
  • NASL family Databases
    NASL id MYSQL_5_7_25.NASL
    description The version of MySQL running on the remote host is 5.7.x prior to 5.7.25. It is, therefore, affected by multiple vulnerabilities, including three of the top vulnerabilities below, as noted in the January 2019 Critical Patch Update advisory: - An unspecified vulnerability in MySQL in the 'Server: Replication' subcomponent could allow an low privileged attacker with network access via multiple protocols to gain unauthorized access critical data or complete access to all MySQL server data. (CVE-2019-2534) - An unspecified vulnerability in MySQL in the 'Server: Optimizer' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2529) - An unspecified vulnerability in MySQL in the 'Server: PS' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2482) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-18
    plugin id 121228
    published 2019-01-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121228
    title MySQL 5.7.x < 5.7.25 Multiple Vulnerabilities (Jan 2019 CPU)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-3863-1.NASL
    description This update for openssl-1_1 fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-0735: Fixed timing vulnerability in ECDSA signature generation (bsc#1113651). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 120166
    published 2019-01-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120166
    title SUSE SLED15 / SLES15 Security Update : openssl-1_1 (SUSE-SU-2018:3863-1)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4348.NASL
    description Several local side channel attacks and a denial of service via large Diffie-Hellman parameters were discovered in OpenSSL, a Secure Sockets Layer toolkit.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 119313
    published 2018-12-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119313
    title Debian DSA-4348-1 : openssl - security update
  • NASL family Web Servers
    NASL id OPENSSL_1_0_2Q.NASL
    description According to its banner, the version of OpenSSL running on the remote host is 1.0.x prior to 1.0.2q. It is, therefore, affected by a denial of service vulnerability and a cache timing side channel vulnerability.
    last seen 2019-02-21
    modified 2019-01-25
    plugin id 121383
    published 2019-01-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121383
    title OpenSSL 1.0.x < 1.0.2q Multiple Vulnerabilities
  • NASL family Web Servers
    NASL id OPENSSL_1_1_0J.NASL
    description According to its banner, the version of OpenSSL running on the remote host is 1.1.0 prior to 1.1.0j. It is, therefore, affected by a denial of service vulnerability, a cache timing side channel vulnerability, and a microarchitecture timing side channel attack.
    last seen 2019-02-21
    modified 2019-01-25
    plugin id 121384
    published 2019-01-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121384
    title OpenSSL 1.1.0 < 1.1.0j Multiple Vulnerabilities
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2018-325-01.NASL
    description New openssl packages are available for Slackware 14.2 and -current to fix security issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119113
    published 2018-11-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119113
    title Slackware 14.0 / 14.1 / 14.2 / current : openssl (SSA:2018-325-01)
  • NASL family PhotonOS Local Security Checks
    NASL id PHOTONOS_PHSA-2018-1_0-0199_OPENSSL.NASL
    description An update of the openssl package has been released.
    last seen 2019-02-08
    modified 2019-02-07
    plugin id 121899
    published 2019-02-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121899
    title Photon OS 1.0: Openssl PHSA-2018-1.0-0199
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_238AE7DEDBA211E8B713B499BAEBFEAF.NASL
    description The OpenSSL project reports : Timing vulnerability in ECDSA signature generation (CVE-2018-0735): The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key (Low). Timing vulnerability in DSA signature generation (CVE-2018-0734) : Avoid a timing attack that leaks information via a side channel that triggers when a BN is resized. Increasing the size of the BNs prior to doing anything with them suppresses the attack (Low).
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 118496
    published 2018-10-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118496
    title FreeBSD : OpenSSL -- Multiple vulnerabilities in 1.1 branch (238ae7de-dba2-11e8-b713-b499baebfeaf)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_2A86F45AFC3C11E8A41400155D006B02.NASL
    description Node.js reports : Updates are now available for all active Node.js release lines. These include fixes for the vulnerabilities identified in the initial announcement. They also include upgrades of Node.js 6 and 8 to OpenSSL 1.0.2q, and upgrades of Node.js 10 and 11 to OpenSSL 1.1.0j. We recommend that all Node.js users upgrade to a version listed below as soon as possible. Debugger port 5858 listens on any interface by default (CVE-2018-12120) All versions of Node.js 6 are vulnerable and the severity is HIGH. When the debugger is enabled with node --debug or node debug, it listens to port 5858 on all interfaces by default. This may allow remote computers to attach to the debug port and evaluate arbitrary JavaScript. The default interface is now localhost. It has always been possible to start the debugger on a specific interface, such as node --debug=localhost. The debugger was removed in Node.js 8 and replaced with the inspector, so no versions from 8 and later are vulnerable. Denial of Service with large HTTP headers (CVE-2018-12121) All versions of 6 and later are vulnerable and the severity is HIGH. By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer. The total size of HTTP headers received by Node.js now must not exceed 8192 bytes. 'Slowloris' HTTP Denial of Service (CVE-2018-12122) All versions of Node.js 6 and later are vulnerable and the severity is LOW. An attacker can cause a Denial of Service (DoS) by sending headers very slowly keeping HTTP or HTTPS connections and associated resources alive for a long period of time. Attack potential is mitigated by the use of a load balancer or other proxy layer. A timeout of 40 seconds now applies to servers receiving HTTP headers. This value can be adjusted with server.headersTimeout. Where headers are not completely received within this period, the socket is destroyed on the next received chunk. In conjunction with server.setTimeout(), this aids in protecting against excessive resource retention and possible Denial of Service. Hostname spoofing in URL parser for JavaScript protocol (CVE-2018-12123) All versions of Node.js 6 and later are vulnerable and the severity is LOW. If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case 'javascript:' (e.g. 'javAscript:') protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect. HTTP request splitting (CVE-2018-12116) Node.js 6 and 8 are vulnerable and the severity is MEDIUM. If Node.js can be convinced to use unsanitized user-provided Unicode data for the path option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server. OpenSSL Timing vulnerability in ECDSA signature generation (CVE-2018-0735) The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side-channel attack. An attacker could use variations in the signing algorithm to recover the private key. OpenSSL Timing vulnerability in DSA signature generation (CVE-2018-0734) The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side-channel attack. An attacker could use variations in the signing algorithm to recover the private key. OpenSSL Microarchitecture timing vulnerability in ECC scalar multiplication (CVE-2018-5407) OpenSSL ECC scalar multiplication, used in e.g. ECDSA and ECDH, has been shown to be vulnerable to a microarchitecture timing side-channel attack. An attacker with sufficient access to mount local timing attacks during ECDSA signature generation could recover the private key.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 119511
    published 2018-12-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119511
    title FreeBSD : node.js -- multiple vulnerabilities (2a86f45a-fc3c-11e8-a414-00155d006b02)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-1464.NASL
    description This update for openssl fixes the following issues : Security issues fixed : - CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). - CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534). - Add missing timing side channel patch for DSA signature generation (bsc#1113742). Non-security issues fixed : - Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209). This update was imported from the SUSE:SLE-12-SP2:Update update project.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119139
    published 2018-11-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119139
    title openSUSE Security Update : openssl (openSUSE-2018-1464)
  • NASL family Databases
    NASL id MYSQL_8_0_14.NASL
    description The version of MySQL running on the remote host is 8.0.x prior to 8.0.14. It is, therefore, affected by multiple vulnerabilities, including three of the top vulnerabilities below, as noted in the January 2019 Critical Patch Update advisory: - An unspecified vulnerability in MySQL in the 'Server: Replication' subcomponent could allow an low privileged attacker with network access via multiple protocols to gain unauthorized access critical data or complete access to all MySQL server data. (CVE-2019-2534) - An unspecified vulnerability in MySQL in the 'Server: Optimizer' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2529) - An unspecified vulnerability in MySQL in the 'Server: PS' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2482) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-18
    plugin id 121229
    published 2019-01-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121229
    title MySQL 8.0.x < 8.0.14 Multiple Vulnerabilities (Jan 2019 CPU)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-1518.NASL
    description This update for openssl-1_0_0 fixes the following issues : Security issues fixed : - CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). - CVE-2018-5407: Added elliptic curve scalar multiplication timing attack defenses that fixes 'PortSmash' (bsc#1113534). Non-security issues fixed : - Added missing timing side channel patch for DSA signature generation (bsc#1113742). - Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078). - Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209) This update was imported from the SUSE:SLE-15:Update update project.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119547
    published 2018-12-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119547
    title openSUSE Security Update : openssl-1_0_0 (openSUSE-2018-1518)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-4001-1.NASL
    description This update for openssl-1_0_0 fixes the following issues : Security issues fixed : CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652). CVE-2018-5407: Added elliptic curve scalar multiplication timing attack defenses that fixes 'PortSmash' (bsc#1113534). Non-security issues fixed: Added missing timing side channel patch for DSA signature generation (bsc#1113742). Set TLS version to 0 in msg_callback for record messages to avoid confusing applications (bsc#1100078). Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 120180
    published 2019-01-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120180
    title SUSE SLED15 / SLES15 Security Update : openssl-1_0_0 (SUSE-SU-2018:4001-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2019-88.NASL
    description This update for nodejs4 fixes the following issues : Security issues fixed : - CVE-2018-0734: Fixed a timing vulnerability in the DSA signature generation (bsc#1113652) - CVE-2018-5407: Fixed a hyperthread port content side channel attack (aka 'PortSmash') (bsc#1113534) - CVE-2018-12120: Fixed that the debugger listens on any interface by default (bsc#1117625) - CVE-2018-12121: Fixed a denial of Service with large HTTP headers (bsc#1117626) - CVE-2018-12122: Fixed the 'Slowloris' HTTP Denial of Service (bsc#1117627) - CVE-2018-12116: Fixed HTTP request splitting (bsc#1117630) - CVE-2018-12123: Fixed hostname spoofing in URL parser for JavaScript protocol (bsc#1117629) This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2019-02-21
    modified 2019-01-28
    plugin id 121415
    published 2019-01-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121415
    title openSUSE Security Update : nodejs4 (openSUSE-2019-88)
  • NASL family Web Servers
    NASL id OPENSSL_1_1_1A.NASL
    description According to its banner, the version of OpenSSL running on the remote host is 1.1.0 prior to 1.1.1a. It is, therefore, affected by a denial of service vulnerability, a cache timing side channel vulnerability, and a microarchitecture timing side channel attack.
    last seen 2019-02-21
    modified 2019-01-25
    plugin id 121385
    published 2019-01-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121385
    title OpenSSL 1.1.1 < 1.1.1a Multiple Vulnerabilities
  • NASL family Misc.
    NASL id NESSUS_TNS_2018_16.NASL
    description According to its self-reported version, the Tenable Nessus application running on the remote host is 8.x prior to 8.1.1. It is, therefore, affected by multiple vulnerabilities: - Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's DSA signature algorithm that renders it vulnerable to a timing side channel attack. An attacker could leverage this vulnerability to recover the private key. (CVE-2018-0734) - Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's Simultaneous Multithreading (SMT) architectures which render it vulnerable to side-channel leakage. This issue is known as 'PortSmash'. An attacker could possibly use this issue to perform a timing side-channel attack and recover private keys. (CVE-2018-5407)
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 120197
    published 2019-01-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120197
    title Tenable Nessus < 8.1.1 Multiple Vulnerabilities (TNS-2018-16)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-1465.NASL
    description This update for openssl-1_1 fixes the following issues : Security issues fixed : - CVE-2018-0734: timing vulnerability in DSA signature generation (bsc#1113652). - CVE-2018-0735: timing vulnerability in ECDSA signature generation (bsc#1113651). This update was imported from the SUSE:SLE-15:Update update project.
    last seen 2019-02-21
    modified 2019-01-30
    plugin id 119140
    published 2018-11-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119140
    title openSUSE Security Update : openssl-1_1 (openSUSE-2018-1465)
  • NASL family Databases
    NASL id MYSQL_5_6_43.NASL
    description The version of MySQL running on the remote host is 5.6.x prior to 5.6.43. It is, therefore, affected by multiple vulnerabilities, including three of the top vulnerabilities below, as noted in the January 2019 Critical Patch Update advisory: - An unspecified vulnerability in MySQL in the 'Server: Replication' subcomponent could allow an low privileged attacker with network access via multiple protocols to gain unauthorized access critical data or complete access to all MySQL server data. (CVE-2019-2534) - An unspecified vulnerability in MySQL in the 'Server: Optimizer' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2529) - An unspecified vulnerability in MySQL in the 'Server: PS' subcomponent could allow an low privileged attacker with network access via multiple protocols to perform a denial of service attack. (CVE-2019-2482) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2019-01-18
    plugin id 121227
    published 2019-01-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121227
    title MySQL 5.6.x < 5.6.43 Multiple Vulnerabilities (Jan 2019 CPU)
refmap via4
bid 105758
confirm
debian
  • DSA-4348
  • DSA-4355
misc https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
ubuntu USN-3840-1
Last major update 30-10-2018 - 08:29
Published 30-10-2018 - 08:29
Last modified 26-04-2019 - 12:34
Back to Top