MDVSA-2013:018 -- Mandriva openssl
|ID: oval:org.secpod.oval:def:1300164||Date: (C)2013-03-22 (M)2018-10-04|
|Class: PATCH||Family: unix|
Multiple vulnerabilities has been found and corrected in openssl: OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote attackers to cause a denial of service via an invalid key . The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the Lucky Thirteen issue . The updated packages have been patched to correct these issues.
|Mandriva Enterprise Server 5.2|