[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

CESA-2015:2617 -- centos 6 openssl

ID: oval:org.secpod.oval:def:203783Date: (C)2015-12-23   (M)2017-11-15
Class: PATCHFamily: unix




OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength, general purpose cryptography library. A NULL pointer derefernce flaw was found in the way OpenSSL verified signatures using the RSA PSS algorithm. A remote attacked could possibly use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server using OpenSSL if it enabled client authentication. A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. A race condition flaw, leading to a double free, was found in the way OpenSSL handled pre-shared key identify hints. A remote attacker could use this flaw to crash a multi-threaded SSL/TLS client using OpenSSL. All openssl users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

Platform:
CentOS 6
Product:
openssl
Reference:
CESA-2015:2617
CVE-2015-3194
CVE-2015-3195
CVE-2015-3196
CVE    3
CVE-2015-3196
CVE-2015-3195
CVE-2015-3194
CPE    51
cpe:/o:centos:centos:6
cpe:/a:openssl:openssl
cpe:/a:oracle:vm_virtualbox:5.0.14
cpe:/a:oracle:vm_virtualbox:4.3.36
...

© 2013 SecPod Technologies