Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.69189
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2010:0888
Resumen:NOSUMMARY
Descripción:Description:
The remote host is missing updates announced in
advisory RHSA-2010:0888.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library.

A race condition flaw has been found in the OpenSSL TLS server extension
parsing code, which could affect some multithreaded OpenSSL applications.
Under certain specific conditions, it may be possible for a remote attacker
to trigger this race condition and cause such an application to crash, or
possibly execute arbitrary code with the permissions of the application.
(CVE-2010-3864)

Note that this issue does not affect the Apache HTTP Server. Refer to Red
Hat Bugzilla bug 649304 for more technical details on how to determine if
your application is affected.

Red Hat would like to thank Rob Hulswit for reporting this issue.

All OpenSSL users should upgrade to these updated packages, which contain a
backported patch to resolve this issue. For the update to take effect, all
services linked to the OpenSSL library must be restarted, or the system
rebooted.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2010-0888.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : High

CVSS Score:
7.6

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-3864
1024743
http://securitytracker.com/id?1024743
20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
http://www.securityfocus.com/archive/1/516397/100/0/threaded
42241
http://secunia.com/advisories/42241
42243
http://secunia.com/advisories/42243
42309
http://secunia.com/advisories/42309
42336
http://secunia.com/advisories/42336
42352
http://secunia.com/advisories/42352
42397
http://secunia.com/advisories/42397
42413
http://secunia.com/advisories/42413
43312
http://secunia.com/advisories/43312
44269
http://secunia.com/advisories/44269
57353
http://secunia.com/advisories/57353
ADV-2010-3041
http://www.vupen.com/english/advisories/2010/3041
ADV-2010-3077
http://www.vupen.com/english/advisories/2010/3077
ADV-2010-3097
http://www.vupen.com/english/advisories/2010/3097
ADV-2010-3121
http://www.vupen.com/english/advisories/2010/3121
APPLE-SA-2011-06-23-1
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
DSA-2125
http://www.debian.org/security/2010/dsa-2125
FEDORA-2010-17826
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051255.html
FEDORA-2010-17827
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051170.html
FEDORA-2010-17847
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051237.html
FreeBSD-SA-10:10
http://security.FreeBSD.org/advisories/FreeBSD-SA-10:10.openssl.asc
HPSBGN02740
http://marc.info/?l=bugtraq&m=132828103218869&w=2
HPSBMA02658
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777
HPSBOV02670
http://marc.info/?l=bugtraq&m=130497251507577&w=2
HPSBUX02638
http://marc.info/?l=bugtraq&m=129916880600544&w=2
RHSA-2010:0888
https://rhn.redhat.com/errata/RHSA-2010-0888.html
SSA:2010-326-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668793
SSRT100339
SSRT100413
SSRT100475
SSRT100741
SUSE-SR:2010:022
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
VU#737740
http://www.kb.cert.org/vuls/id/737740
[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html
[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html
http://blogs.sun.com/security/entry/cve_2010_3864_race_condition
http://openssl.org/news/secadv_20101116.txt
http://support.apple.com/kb/HT4723
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
http://www.adobe.com/support/security/bulletins/apsb11-11.html
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
https://bugzilla.redhat.com/show_bug.cgi?id=649304
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.