[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97147

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2015-2617 -- Oracle openssl

ID: oval:org.secpod.oval:def:1501275Date: (C)2015-12-17   (M)2017-11-10
Class: PATCHFamily: unix




OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength, general purpose cryptography library. A NULL pointer derefernce flaw was found in the way OpenSSL verified signatures using the RSA PSS algorithm. A remote attacked could possibly use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server using OpenSSL if it enabled client authentication. A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. A race condition flaw, leading to a double free, was found in the way OpenSSL handled pre-shared key identify hints. A remote attacker could use this flaw to crash a multi-threaded SSL/TLS client using OpenSSL. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Platform:
Oracle Linux 7
Product:
openssl
Reference:
ELSA-2015-2617
CVE-2015-3194
CVE-2015-3195
CVE-2015-3196
CVE-2015-1791
CVE-2015-0209
CVE-2014-8176
CVE-2015-1789
CVE-2015-1790
CVE-2015-1792
CVE-2015-3216
CVE-2015-4000
CVE-2015-0287
CVE-2015-0286
CVE-2015-0288
CVE-2015-0289
CVE-2015-0292
CVE-2015-0293
CVE    17
CVE-2015-3216
CVE-2015-0287
CVE-2015-1791
CVE-2015-1792
...
CPE    77
cpe:/a:mozilla:firefox
cpe:/a:apple:safari
cpe:/a:openssl:openssl:1.0.0n
cpe:/a:openssl:openssl:1.0.0m
...

© 2013 SecPod Technologies