Description: | Description: The remote host is missing an update to openssl announced via advisory USN-990-1.
Details follow:
Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3 protocols. If an attacker could perform a man in the middle attack at the start of a TLS connection, the attacker could inject arbitrary content at the beginning of the user's session. This update adds backported support for the new RFC5746 renegotiation extension and will use it when both the client and the server support it.
ATTENTION: After applying this update, a patched server will allow both patched and unpatched clients to connect, but unpatched clients will not be able to renegotiate. For more information, please refer to the following: http://www.openssl.org/docs/ssl/SSL_CTX_set_options.html#SECURE_RENEGOTIATION
Solution: The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: libssl0.9.8 0.9.8a-7ubuntu0.12
Ubuntu 8.04 LTS: libssl0.9.8 0.9.8g-4ubuntu3.10
Ubuntu 9.04: libssl0.9.8 0.9.8g-15ubuntu3.5
Ubuntu 9.10: libssl0.9.8 0.9.8g-16ubuntu3.2
Ubuntu 10.04 LTS: libssl0.9.8 0.9.8k-7ubuntu8.1
After a standard system update you need to reboot your computer to make all the necessary changes.
http://www.securityspace.com/smysecure/catid.html?in=USN-990-1
Risk factor : High
CVSS Score: 5.8
|