Description: | Description:
The remote host is missing an update to openssl announced via advisory MDKSA-2003:035.
Researchers discovered a timing-based attack on RSA keys that OpenSSL is generally vulnerable to, unless RSA blinding is enabled. Patches from the OpenSSL team have been applied to turn RSA blinding on by default.
An extension of the Bleichenbacher attack on RSA with PKS #1 v1.5 padding as used in SSL 3.0 and TSL 1.0 was also created by Czech cryptologists Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa. This attack requires the attacker to open millions of SSL/TLS connections to the server they are attacking. This is done because the server's behaviour when faced with specially crafted RSA ciphertexts can reveal information that would in effect allow the attacker to perform a single RSA private key operation on a ciphertext of their choice, using the server's RSA key. Despite this, the server's RSA key is not compromised at any time. Patches from the OpenSSL team modify SSL/TLS server behaviour to avoid this vulnerability.
Affected versions: 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, Corporate Server 2.1,
Multi Network Firewall 8.2,
Single Network Firewall 7.2
Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2003:035 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0147 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0131 http://www.openssl.org/news/secadv_20030317.txt http://www.openssl.org/news/secadv_20030319.txt http://eprint.iacr.org/2003/052/ http://crypto.stanford.edu/~ dabo/abstracts/ssl-timing.html
Risk factor : High
CVSS Score: 7.5
|