Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
These remote packages are missing security patches :
Yutaka Oiwa discovered a possible cryptographic weakness in OpenSSL
applications. Applications using the OpenSSL library can use the
SSL_OP_MSIE_SSLV2_RSA_PADDING option (or SSL_OP_ALL, which implies the
former) to maintain compatibility with third party products, which is
achieved by working around known bugs in them.
The SSL_OP_MSIE_SSLV2_RSA_PADDING option disabled a verification step
in the SSL 2.0 server supposed to prevent active protocol-version
rollback attacks. With this verification step disabled, a possible hacker
acting as a "man in the middle" could force a client and a server to
negotiate the SSL 2.0 protocol even if these parties both supported
SSL 3.0 or TLS 1.0. The SSL 2.0 protocol is known to have severe
cryptographic weaknesses and is supported as a fallback only.
Upgrade to :
- libssl-dev-0.9.7g-1ubuntu1.1 (Ubuntu 5.10)
- libssl0.9.7-0.9.7g-1ubuntu1.1 (Ubuntu 5.10)
- openssl-0.9.7g-1ubuntu1.1 (Ubuntu 5.10)
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi
|UltraSlim 1.92TB 2.5" SSD MICRON 5100 PRO SERIES SATA MTFDDAK1T9TCB #c-425
|Samsung 60GB SATA SSD 2.5" Hot-swap MK0060EAVDR 570774-001 572254-001 #C-420
|Hitachi HGST 600GB Internal 10000RPM 2.5" (0B23909) HDD HUC106060CSS600
|2017 200GB HGST Ultrastar 2.5" SFF Enterprise Solid State Drive HUSMM1640ASS200
No Discussions have been posted on this vulnerability.