Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2002-157: openssl


Vulnerability Assessment Details

RHSA-2002-157: openssl

Vulnerability Assessment Summary
Check for the version of the openssl packages

Detailed Explanation for this Vulnerability Assessment


Updated OpenSSL packages are available which fix several serious buffer
overflow vulnerabilities.

OpenSSL is a commercial-grade, full-featured, and Open Source toolkit which
implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer
Security (TLS v1) protocols as well as a full-strength general purpose
cryptography library. A security audit of the OpenSSL code sponsored by
DARPA found several buffer overflows in OpenSSL which affect versions 0.9.7
and 0.9.6d and earlier:

1. The master key supplied by a client to an SSL version 2 server could be
oversized, causing a stack-based buffer overflow. This issue is remotely
exploitable. Services that have SSLv2 disabled would not be vulnerable to
this issue. (CVE-2002-0656)

2. The SSLv3 session ID supplied to a client from a malicious server could
be oversized and overrun a buffer. This issue looks to be remotely
exploitable. (CVE-2002-0656)

3. Various buffers used for storing ASCII representations of integers were
too small on 64 bit platforms. This issue may be exploitable.
(CVE-2002-0655)

A further issue was found in OpenSSL 0.9.7 that does not affect versions of
OpenSSL shipped with Red Hat Linux (CVE-2002-0657).

A large number of applications within Red Hat Linux make use the OpenSSL
library to provide SSL support. All users are therefore advised to upgrade
to the errata OpenSSL packages, which contain patches to correct these
vulnerabilities.

NOTE:

Please read the Solution section below as it contains instructions for
making sure that all SSL-enabled processes are restarted after the update
is applied.

Thanks go to the OpenSSL team and Ben Laurie for providing patches for
these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2002-157.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

DELL POWEREDGE R820 SERVER 8B TWO E5-4603 2.0GHZ 48GB 3 X 1TB SAS H710
$2889.0
DELL POWEREDGE R820 SERVER 8B TWO E5-4603 2.0GHZ 48GB 3 X 1TB SAS H710 pictureDELL POWEREDGE R720 8B 2.5 SERVER E5-2630V2 2.60GHZ 16GB 2 X 800GB SSD H310
$2009.0
DELL POWEREDGE R720 8B 2.5 SERVER E5-2630V2 2.60GHZ 16GB 2 X 800GB SSD H310 pictureDELL POWEREDGE R630 10 BAY TWO E5-2620V3 2.4GHZ 768GB 2 X 1.2TB 10K 12G H330
$10159.0
DELL POWEREDGE R630 10 BAY TWO E5-2620V3 2.4GHZ 768GB 2 X 1.2TB 10K 12G H330 pictureDELL POWEREDGE R630 10 BAY TWO E5-2690V3 2.6GHZ 32GB 3 X 480GB SSD H730
$4689.0
DELL POWEREDGE R630 10 BAY TWO E5-2690V3 2.6GHZ 32GB 3 X 480GB SSD H730 picture


Discussions

No Discussions have been posted on this vulnerability.