Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-119: openssl


Vulnerability Assessment Details

RHSA-2004-119: openssl

Vulnerability Assessment Summary
Check for the version of the openssl packages

Detailed Explanation for this Vulnerability Assessment


Updated OpenSSL packages that fix a remote denial of service vulnerability
are now available for Red Hat Enterprise Linux 2.1.

OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and
Transport Layer Security (TLS v1) protocols as well as a full-strength
general purpose cryptography library.

Testing performed by the OpenSSL group using the Codenomicon TLS Test Tool
uncovered a bug in older versions of OpenSSL 0.9.6 prior to 0.9.6d that can
lead to a denial of service attack (infinite loop). The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2004-0081 to this issue.

Testing performed by Novell using a test suite provided by NISCC uncovered
an issue in the ASN.1 parser in versions of OpenSSL 0.9.6 prior to 0.9.6l
which could cause large recursion and possibly lead to a denial of service
attack if used where stack space is limited. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0851
to this issue.

These updated packages contain patches provided by the OpenSSL group that
protect against these issues.

NOTE: Because server applications are affected by this issue, users are
advised to either restart all services using OpenSSL functionality or
restart their system after installing these updated packages.




Solution : http://rhn.redhat.com/errata/RHSA-2004-119.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Dell Brocade 6510 48-Port 16Gb Fibre Channel Switch Reverse Air w/24x 8Gb SFP
$3000.0
Dell Brocade 6510 48-Port 16Gb Fibre Channel Switch Reverse Air w/24x 8Gb SFP pictureDell 358VV Force10 SFP+5M Twinax SFP Port Cable Heavy Duty Connector
$5.0
Dell 358VV Force10 SFP+5M Twinax SFP Port Cable Heavy Duty Connector pictureLot of Genuine CISCO Plug-in Transceiver Module SFP-10G-LRM nice working pulls.
$0.99
Lot of Genuine CISCO Plug-in Transceiver Module SFP-10G-LRM nice working pulls. pictureWTD RTXM191-400 1.25G-1310NM-10KM-SM-ESFP SFP Transceiver Module 20 pcs. / lot
$150.0
WTD RTXM191-400 1.25G-1310NM-10KM-SM-ESFP SFP Transceiver Module 20 pcs. / lot picture


Discussions

No Discussions have been posted on this vulnerability.