Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
These remote packages are missing security patches :
Yutaka Oiwa discovered a possible cryptographic weakness in OpenSSL
applications. Applications using the OpenSSL library can use the
SSL_OP_MSIE_SSLV2_RSA_PADDING option (or SSL_OP_ALL, which implies the
former) to maintain compatibility with third party products, which is
achieved by working around known bugs in them.
The SSL_OP_MSIE_SSLV2_RSA_PADDING option disabled a verification step
in the SSL 2.0 server supposed to prevent active protocol-version
rollback attacks. With this verification step disabled, a possible hacker
acting as a "man in the middle" could force a client and a server to
negotiate the SSL 2.0 protocol even if these parties both supported
SSL 3.0 or TLS 1.0. The SSL 2.0 protocol is known to have severe
cryptographic weaknesses and is supported as a fallback only.
Upgrade to :
- libssl-dev-0.9.7g-1ubuntu1.1 (Ubuntu 5.10)
- libssl0.9.7-0.9.7g-1ubuntu1.1 (Ubuntu 5.10)
- openssl-0.9.7g-1ubuntu1.1 (Ubuntu 5.10)
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi
|Super Micro Chasis with 14 Blade Server 28 Xeon CPUs Inlcuded 96GB Ram Included
|NEW 320W HP Proliant Gen7 Generation 7 Microserver Power Supply Replace N40L.1
|8GB DDR3L ECC SODIMM Intel Supermicro Atom C2000 Microserver Motherboard Memory
|HP ProLiant Microserver Gen8, 2.5GHz, 1TB RAID 1, 8GB RAM, ILO, USB 3.0
No Discussions have been posted on this vulnerability.