Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.53881
Kategorie:Slackware Local Security Checks
Titel:Slackware: Security Advisory (SSA:2003-273-01)
Zusammenfassung:The remote host is missing an update for the 'OpenSSL' package(s) announced via the SSA:2003-273-01 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'OpenSSL' package(s) announced via the SSA:2003-273-01 advisory.

Vulnerability Insight:
Upgraded OpenSSL packages are available for Slackware 8.1, 9.0,
9.1, and -current. These fix problems with ASN.1 parsing which
could lead to a denial of service. It is not known whether the
problems could lead to the running of malicious code on the
server, but it has not been ruled out.

We recommend sites that use OpenSSL upgrade to the fixed packages
right away.


Here are the details from the Slackware 9.1 ChangeLog:
+--------------------------+
Tue Sep 30 16:16:35 PDT 2003
patches/packages/openssl-0.9.7c-i486-1.tgz: Upgraded to OpenSSL 0.9.7c.
patches/packages/openssl-solibs-0.9.7c-i486-1.tgz: Upgraded to OpenSSL 0.9.7c.
This update fixes problems with OpenSSL's ASN.1 parsing which could lead to
a denial of service. It is not known whether the problems could lead to the
running of malicious code on the server, but it has not been ruled out.
For detailed information, see OpenSSL's security advisory:
[link moved to references]
We recommend sites that use OpenSSL upgrade to the fixed packages right away.
(* Security fix *)
+--------------------------+

Affected Software/OS:
'OpenSSL' package(s) on Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

CopyrightCopyright (C) 2012 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.