Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Update for openssl RHSA-2014:0679-01
Summary:The remote host is missing an update for the 'openssl'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'openssl'
package(s) announced via the referenced advisory.

Vulnerability Insight:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library.

It was found that OpenSSL clients and servers could be forced, via a
specially crafted handshake packet, to use weak keying material for
communication. A man-in-the-middle attacker could use this flaw to decrypt
and modify traffic between a client and a server. (CVE-2014-0224)

Note: In order to exploit this flaw, both the server and the client must be
using a vulnerable version of OpenSSL the server must be using OpenSSL
version 1.0.1 and above, and the client must be using any version of
OpenSSL. For more information about this flaw, buffer overflow flaw was found in the way OpenSSL handled invalid DTLS
packet fragments. A remote attacker could possibly use this flaw to execute
arbitrary code on a DTLS client or server. (CVE-2014-0195)

Multiple flaws were found in the way OpenSSL handled read and write buffers
when the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client or
server using OpenSSL could crash or unexpectedly drop connections when
processing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198)

A denial of service flaw was found in the way OpenSSL handled certain DTLS
ServerHello requests. A specially crafted DTLS handshake packet could cause
a DTLS client using OpenSSL to crash. (CVE-2014-0221)

A NULL pointer dereference flaw was found in the way OpenSSL performed
anonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially
crafted handshake packet could cause a TLS/SSL client that has the
anonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)

Red Hat would like to thank the OpenSSL project for reporting these issues.
Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter
of CVE-2014-0224, Jri Aedla as the original reporter of CVE-2014-0195,
Imre Rad of Search-Lab as the original reporter of CVE-2014-0221, and Felix
Grbert and Ivan Fratri of Google as the original reporters of

All OpenSSL users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. For the update to take
effect, all services linked to the OpenSSL library (such as httpd and other
SSL-enabled services) must be restarted or the system rebooted.

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
openssl on Red Hat Enterprise Linux Server (v. 7)

Please Install the Updated Packages.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-5298
BugTraq ID: 66801
Bugtraq: 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (Google Search)
Cisco Security Advisory: 20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products
HPdes Security Advisory: HPSBGN03068
HPdes Security Advisory: HPSBHF03052
HPdes Security Advisory: HPSBMU03051
HPdes Security Advisory: HPSBMU03055
HPdes Security Advisory: HPSBMU03056
HPdes Security Advisory: HPSBMU03057
HPdes Security Advisory: HPSBMU03062
HPdes Security Advisory: HPSBMU03074
HPdes Security Advisory: HPSBMU03076
OpenBSD Security Advisory: [5.5] 004: SECURITY FIX: April 12, 2014
SuSE Security Announcement: SUSE-SU-2015:0743 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-0195
BugTraq ID: 67900
HPdes Security Advisory: HPSBGN03050
HPdes Security Advisory: HPSBHF03293
HPdes Security Advisory: HPSBMU03065
HPdes Security Advisory: HPSBMU03069
HPdes Security Advisory: HPSBOV03047
HPdes Security Advisory: HPSBUX03046
HPdes Security Advisory: SSRT101590
HPdes Security Advisory: SSRT101846
SuSE Security Announcement: openSUSE-SU-2016:0640 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-0198
BugTraq ID: 67193
Debian Security Information: DSA-2931 (Google Search)
OpenBSD Security Advisory: [5.5] 005: RELIABILITY FIX: May 1, 2014
SuSE Security Announcement: openSUSE-SU-2014:0634 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:0635 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-0221
BugTraq ID: 67901
RedHat Security Advisories: RHSA-2014:1021
Common Vulnerability Exposure (CVE) ID: CVE-2014-0224
CERT/CC vulnerability note: VU#978508
HPdes Security Advisory: HPSBHF03088
HPdes Security Advisory: HPSBHF03145
HPdes Security Advisory: HPSBMU03053
HPdes Security Advisory: HPSBMU03058
HPdes Security Advisory: HPSBMU03070
HPdes Security Advisory: HPSBMU03071
HPdes Security Advisory: HPSBMU03078
HPdes Security Advisory: HPSBMU03083
HPdes Security Advisory: HPSBMU03089
HPdes Security Advisory: HPSBMU03094
HPdes Security Advisory: HPSBMU03101
HPdes Security Advisory: HPSBMU03216
HPdes Security Advisory: HPSBPI03107
HPdes Security Advisory: HPSBST03097
HPdes Security Advisory: HPSBST03098
HPdes Security Advisory: HPSBST03103
HPdes Security Advisory: HPSBST03106
HPdes Security Advisory: HPSBST03195
HPdes Security Advisory: HPSBST03265
HPdes Security Advisory: SSRT101818
RedHat Security Advisories: RHSA-2014:0624
RedHat Security Advisories: RHSA-2014:0626
RedHat Security Advisories: RHSA-2014:0627
RedHat Security Advisories: RHSA-2014:0630
RedHat Security Advisories: RHSA-2014:0631
RedHat Security Advisories: RHSA-2014:0632
RedHat Security Advisories: RHSA-2014:0633
RedHat Security Advisories: RHSA-2014:0680
SuSE Security Announcement: SUSE-SU-2015:0578 (Google Search)
SuSE Security Announcement: openSUSE-SU-2015:0229 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-3470
BugTraq ID: 67898
CopyrightCopyright (C) 2014 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.