Mandriva Linux Security Advisory MDVSA-2014:105
http://www.mandriva.com/en/
______________________________
Package : openssl
Date : June 9, 2014
Affected: Enterprise Server 5.0
______________________________
Problem Description:
Multiple vulnerabilities has been discovered and corrected in openssl:
The dtls1_get_message_fragment function in d1_both.c in OpenSSL before
0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote
attackers to cause a denial of service (recursion and client crash)
via a DTLS hello message in an invalid DTLS handshake (CVE-2014-0221).
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before
1.0.1h does not properly restrict processing of ChangeCipherSpec
messages, which allows man-in-the-middle attackers to trigger use of a
zero-length master key in certain OpenSSL-to-OpenSSL communications,
and consequently hijack sessions or obtain sensitive information,
via a crafted TLS handshake, aka the CCS Injection vulnerability
(CVE-2014-0224).
The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL
before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when
an anonymous ECDH cipher suite is used, allows remote attackers to
cause a denial of service (NULL pointer dereference and client crash)
by triggering a NULL certificate value (CVE-2014-3470).
The updated packages have been patched to correct these issues.
______________________________
_
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://www.openssl.org/news/
______________________________
Updated Packages:
Mandriva Enterprise Server 5:
ef1687f8f4d68dd34149dbb04f3fcc
3e46ee354bd0add0234eaf873f0a07
0cc60393474d11a3786965d780e39e
16d367fe394b2f16b9f022ea7ba75a
223a4a6b80f1b2eb3cbfaf99473423
Mandriva Enterprise Server 5/X86_64:
85a51b41a45f6905ea778347d8b236
d0bf9ef6c6e33d0c6158add14cbe04
707842b93162409157667f696996f4
70f4de1608d99c970afa1786595a76
223a4a6b80f1b2eb3cbfaf99473423
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
______________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
Komentarų nėra:
Rašyti komentarą