English | Deutsch | Español | Português
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
    Search 100037 CVE descriptions
and 53744 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Amazon Linux Local Security Checks
Title:Amazon Linux Local Check: alas-2016-749
Summary:Amazon Linux Local Security Checks
Amazon Linux Local Security Checks

Vulnerability Insight:
A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.The OpenSSL Security Advisory [22 Sep 2016] refers to additional CVEs. CVE-2016-6305 does not affect OpenSSL 1.0.1. The remaining CVEs listed will be fixed in a later update.The OpenSSL Security Advisory [26 Sep 2016] refers to two additional CVEs which do not affect OpenSSL 1.0.1.(Updated 2016-09-26: Included a reference to the 26 Sep 2016 upstream advisory.)

Run yum update openssl to update your system.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-6304
SuSE Security Announcement: SUSE-SU-2016:2470 (Google Search)
BugTraq ID: 93150
Common Vulnerability Exposure (CVE) ID: CVE-2016-6305
BugTraq ID: 93149
CopyrightThis script is Copyright (C) 2016 Greenbone Networks GmbH

This is only one of 53744 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
Registered User Login

 Forgot userid or passwd?

Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2017 E-Soft Inc. All rights reserved.