Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.68671
Category:Slackware Local Security Checks
Title:Slackware: Security Advisory (SSA:2010-340-01)
Summary:The remote host is missing an update for the 'openssl' package(s) announced via the SSA:2010-340-01 advisory.
Description:Summary:
The remote host is missing an update for the 'openssl' package(s) announced via the SSA:2010-340-01 advisory.

Vulnerability Insight:
New openssl packages are available for Slackware 11.0, 12.0, 12.1, 12.2, 13.0,
13.1, and -current to fix security issues.


Here are the details from the Slackware 13.1 ChangeLog:
+--------------------------+
patches/packages/openssl-0.9.8q-i486-1_slack13.1.txz: Upgraded.
This OpenSSL update contains some security related bugfixes.
For more information, see the included CHANGES and NEWS files, and:
[links moved to references]
(* Security fix *)
patches/packages/openssl-solibs-0.9.8q-i486-1_slack13.1.txz: Upgraded.
(* Security fix *)
+--------------------------+

Affected Software/OS:
'openssl' package(s) on Slackware 11.0, Slackware 12.0, Slackware 12.1, Slackware 12.2, Slackware 13.0, Slackware 13.1, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-4180
1024822
http://www.securitytracker.com/id?1024822
42469
http://secunia.com/advisories/42469
42473
http://secunia.com/advisories/42473
42493
http://secunia.com/advisories/42493
42571
http://secunia.com/advisories/42571
42620
http://secunia.com/advisories/42620
42811
http://secunia.com/advisories/42811
42877
http://secunia.com/advisories/42877
43169
http://secunia.com/advisories/43169
43170
http://secunia.com/advisories/43170
43171
http://secunia.com/advisories/43171
43172
http://secunia.com/advisories/43172
43173
http://secunia.com/advisories/43173
44269
http://secunia.com/advisories/44269
45164
http://www.securityfocus.com/bid/45164
69565
http://osvdb.org/69565
ADV-2010-3120
http://www.vupen.com/english/advisories/2010/3120
ADV-2010-3122
http://www.vupen.com/english/advisories/2010/3122
ADV-2010-3134
http://www.vupen.com/english/advisories/2010/3134
ADV-2010-3188
http://www.vupen.com/english/advisories/2010/3188
ADV-2011-0032
http://www.vupen.com/english/advisories/2011/0032
ADV-2011-0076
http://www.vupen.com/english/advisories/2011/0076
ADV-2011-0268
http://www.vupen.com/english/advisories/2011/0268
APPLE-SA-2011-06-23-1
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
DSA-2141
http://www.debian.org/security/2011/dsa-2141
FEDORA-2010-18736
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052315.html
FEDORA-2010-18765
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052027.html
HPSBHF02706
http://marc.info/?l=bugtraq&m=132077688910227&w=2
HPSBMA02658
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777
HPSBMU02759
http://www.securityfocus.com/archive/1/522176
HPSBOV02670
http://marc.info/?l=bugtraq&m=130497251507577&w=2
HPSBUX02638
http://marc.info/?l=bugtraq&m=129916880600544&w=2
MDVSA-2010:248
http://www.mandriva.com/security/advisories?name=MDVSA-2010:248
RHSA-2010:0977
http://www.redhat.com/support/errata/RHSA-2010-0977.html
RHSA-2010:0978
http://www.redhat.com/support/errata/RHSA-2010-0978.html
RHSA-2010:0979
http://www.redhat.com/support/errata/RHSA-2010-0979.html
RHSA-2011:0896
http://www.redhat.com/support/errata/RHSA-2011-0896.html
SSA:2010-340-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668471
SSRT100339
SSRT100413
SSRT100475
SSRT100613
SSRT100817
SUSE-SR:2011:001
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
SUSE-SR:2011:009
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
SUSE-SU-2011:0847
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
USN-1029-1
http://ubuntu.com/usn/usn-1029-1
VU#737740
http://www.kb.cert.org/vuls/id/737740
http://cvs.openssl.org/chngview?cn=20131
http://openssl.org/news/secadv_20101202.txt
http://support.apple.com/kb/HT4723
https://bugzilla.redhat.com/show_bug.cgi?id=659462
https://kb.bluecoat.com/index?page=content&id=SA53&actp=LIST
openSUSE-SU-2011:0845
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
oval:org.mitre.oval:def:18910
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18910
Common Vulnerability Exposure (CVE) ID: CVE-2010-4252
1024823
http://securitytracker.com/id?1024823
45163
http://www.securityfocus.com/bid/45163
57353
http://secunia.com/advisories/57353
http://cvs.openssl.org/chngview?cn=20098
http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
https://bugzilla.redhat.com/show_bug.cgi?id=659297
https://github.com/seb-m/jpake
oval:org.mitre.oval:def:19039
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19039
CopyrightCopyright (C) 2012 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.