Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59219
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-534-1 (openssl)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to openssl
announced via advisory USN-534-1.

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04
Ubuntu 7.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

Details follow:

Andy Polyakov discovered that the DTLS implementation in OpenSSL
was vulnerable. A remote attacker could send a specially crafted
connection request to services using DTLS and execute arbitrary code
with the service's privileges. There are no known Ubuntu applications
that are currently using DTLS.

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
libssl0.9.8 0.9.8a-7ubuntu0.5

Ubuntu 6.10:
libssl0.9.8 0.9.8b-2ubuntu2.2

Ubuntu 7.04:
libssl0.9.8 0.9.8c-4ubuntu0.2

Ubuntu 7.10:
libssl0.9.8 0.9.8e-5ubuntu3.1

After a standard system upgrade you need to reboot your computer to
affect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-534-1

Risk factor : Critical

CVSS Score:
9.3

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-4995
BugTraq ID: 26055
http://www.securityfocus.com/bid/26055
Bugtraq: 20071012 OpenSSL Security Advisory (Google Search)
http://www.securityfocus.com/archive/1/482167/100/0/threaded
Debian Security Information: DSA-1571 (Google Search)
http://www.debian.org/security/2008/dsa-1571
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00218.html
http://security.gentoo.org/glsa/glsa-200710-30.xml
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
HPdes Security Advisory: HPSBUX02296
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01299773
HPdes Security Advisory: SSRT071504
http://www.mandriva.com/security/advisories?name=MDKSA-2007:237
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738962
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10288
http://www.redhat.com/support/errata/RHSA-2007-0964.html
http://securitytracker.com/id?1018810
http://secunia.com/advisories/25878
http://secunia.com/advisories/27205
http://secunia.com/advisories/27217
http://secunia.com/advisories/27271
http://secunia.com/advisories/27363
http://secunia.com/advisories/27434
http://secunia.com/advisories/27933
http://secunia.com/advisories/28084
http://secunia.com/advisories/30161
http://secunia.com/advisories/30220
http://secunia.com/advisories/30852
SuSE Security Announcement: SUSE-SR:2007:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
https://usn.ubuntu.com/534-1/
http://www.vupen.com/english/advisories/2007/3487
http://www.vupen.com/english/advisories/2007/4219
http://www.vupen.com/english/advisories/2008/1937/references
XForce ISS Database: openssl-dtls-code-execution(37185)
https://exchange.xforce.ibmcloud.com/vulnerabilities/37185
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2022 E-Soft Inc. All rights reserved.