Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2002-157: openssl


Vulnerability Assessment Details

RHSA-2002-157: openssl

Vulnerability Assessment Summary
Check for the version of the openssl packages

Detailed Explanation for this Vulnerability Assessment


Updated OpenSSL packages are available which fix several serious buffer
overflow vulnerabilities.

OpenSSL is a commercial-grade, full-featured, and Open Source toolkit which
implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer
Security (TLS v1) protocols as well as a full-strength general purpose
cryptography library. A security audit of the OpenSSL code sponsored by
DARPA found several buffer overflows in OpenSSL which affect versions 0.9.7
and 0.9.6d and earlier:

1. The master key supplied by a client to an SSL version 2 server could be
oversized, causing a stack-based buffer overflow. This issue is remotely
exploitable. Services that have SSLv2 disabled would not be vulnerable to
this issue. (CVE-2002-0656)

2. The SSLv3 session ID supplied to a client from a malicious server could
be oversized and overrun a buffer. This issue looks to be remotely
exploitable. (CVE-2002-0656)

3. Various buffers used for storing ASCII representations of integers were
too small on 64 bit platforms. This issue may be exploitable.
(CVE-2002-0655)

A further issue was found in OpenSSL 0.9.7 that does not affect versions of
OpenSSL shipped with Red Hat Linux (CVE-2002-0657).

A large number of applications within Red Hat Linux make use the OpenSSL
library to provide SSL support. All users are therefore advised to upgrade
to the errata OpenSSL packages, which contain patches to correct these
vulnerabilities.

NOTE:

Please read the Solution section below as it contains instructions for
making sure that all SSL-enabled processes are restarted after the update
is applied.

Thanks go to the OpenSSL team and Ben Laurie for providing patches for
these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2002-157.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

CN-0WG233 DELL WG233 OPTIPLEX GX520 MOTHERBOARD WITH IO PLATE
$13.95
CN-0WG233 DELL WG233 OPTIPLEX GX520 MOTHERBOARD WITH IO PLATE pictureToshiba Satellite C655-S5212 MOTHERBOARD W/ HEATSINK V000225140
$56.5
Toshiba Satellite C655-S5212 MOTHERBOARD W/ HEATSINK V000225140 pictureFor Asus laptop K53SV rev 3.0 motherboard GT520M HM65 PGA989 DDR3 mainboard
$50.0
For Asus laptop K53SV rev 3.0 motherboard GT520M HM65 PGA989 DDR3 mainboard  picture90 Degree Left angled USB 3.0 B Type Male to 3.0 Motherboard 19pin Header Cable
$0.99
90 Degree Left angled USB 3.0 B Type Male to 3.0 Motherboard 19pin Header Cable picture


Discussions

No Discussions have been posted on this vulnerability.