[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2008:107 -- Mandriva openssl

ID: oval:org.secpod.oval:def:301556Date: (C)2012-01-07   (M)2023-11-13
Class: PATCHFamily: unix




Testing using the Codenomicon TLS test suite discovered a flaw in the handling of server name extension data in OpenSSL 0.9.8f and OpenSSL 0.9.8g. If OpenSSL has been compiled using the non-default TLS server name extensions, a remote attacker could send a carefully crafted packet to a server application using OpenSSL and cause a crash. Testing using the Codenomicon TLS test suite discovered a flaw if the "Server Key exchange message" is omitted from a TLS handshake in OpenSSL 0.9.8f and OpenSSL 0.9.8g. If a client connects to a malicious server with particular cipher suites, the server could cause the client to crash. The updated packages have been patched to fix these flaws. Note that any applications using this library must be restarted for the update to take effect.

Platform:
Mandriva Linux 2008.1
Product:
openssl
Reference:
MDVSA-2008:107
CVE-2008-0891
CVE-2008-1672
CVE    2
CVE-2008-0891
CVE-2008-1672
CPE    1
cpe:/o:mandriva:linux:2008.1

© SecPod Technologies