Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51530
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2002:516
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory CLA-2002:516.

OpenSSL implements the Secure Sockets Layer (SSL v2/v3) and Transport
Layer Security (TLS v1) protocols as well as full-strength general
purpose cryptography functions. It's used (as a library) by several
projects, like Apache, OpenSSH, Bind, OpenLDAP and many others
clients and servers programs.

In the last update announcement[1]: CLSA-2002:513 from 07/31/2002,
the fix for the ASN.1 string parsing did not fully eliminate the
vulnerability. This new update includes the fixes from the openssl
development version[2] (CVS).

Aditionally, a fix for an integer overflow[2] check which was not in
conformity with the C ANSI specification was incorporated.


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000513&idioma=en
http://cert.uni-stuttgart.de/advisories/c-integer-overflow.php
http://www.securityspace.com/smysecure/catid.html?in=CLA-2002:516
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002002

Risk factor : High

CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.