[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2013:018 -- Mandriva openssl

ID: oval:org.secpod.oval:def:1300164Date: (C)2013-03-22   (M)2017-09-22
Class: PATCHFamily: unix




Multiple vulnerabilities has been found and corrected in openssl: OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote attackers to cause a denial of service via an invalid key . The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the Lucky Thirteen issue . The updated packages have been patched to correct these issues.

Platform:
Mandriva Enterprise Server 5.2
Product:
openssl
Reference:
MDVSA-2013:018
CVE-2013-0166
CVE-2013-0169
CVE    2
CVE-2013-0169
CVE-2013-0166
CPE    121
cpe:/a:oracle:openjdk:1.7.0
cpe:/a:polarssl:polarssl:0.14.0
cpe:/a:polarssl:polarssl:0.14.2
cpe:/a:polarssl:polarssl:0.14.3
...

© 2013 SecPod Technologies