Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.890814
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-814-1)
Summary:The remote host is missing an update for the Debian 'openssl' package(s) announced via the DLA-814-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'openssl' package(s) announced via the DLA-814-1 advisory.

Vulnerability Insight:
Several vulnerabilities were discovered in OpenSSL:

CVE-2016-7056

A local timing attack was discovered against ECDSA P-256.

CVE-2016-8610

It was discovered that no limit was imposed on alert packets during an SSL handshake.

CVE-2017-3731

Robert Swiecki discovered that the RC4-MD5 cipher when running on 32 bit systems could be forced into an out-of-bounds read, resulting in denial of service.

For Debian 7 Wheezy, these problems have been fixed in version 1.0.1t-1+deb7u2.

We recommend that you upgrade your openssl packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]

Affected Software/OS:
'openssl' package(s) on Debian 7.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-7056
1037575
http://www.securitytracker.com/id/1037575
95375
http://www.securityfocus.com/bid/95375
DSA-3773
https://www.debian.org/security/2017/dsa-3773
RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1413
RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1414
RHSA-2017:1415
http://rhn.redhat.com/errata/RHSA-2017-1415.html
RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1801
RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:1802
[oss-security] 20170110 CVE-2016-7056 ECDSA P-256 timing attack key recovery (OpenSSL, LibreSSL, BoringSSL)
https://seclists.org/oss-sec/2017/q1/52
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7056
https://eprint.iacr.org/2016/1195
https://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/033_libcrypto.patch.sig
https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/016_libcrypto.patch.sig
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=8aed2a7548362e88e84a7feb795a3a97e8395008
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7056.html
https://security-tracker.debian.org/tracker/CVE-2016-7056
Common Vulnerability Exposure (CVE) ID: CVE-2016-8610
1037084
http://www.securitytracker.com/id/1037084
93841
http://www.securityfocus.com/bid/93841
FreeBSD-SA-16:35
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc
RHSA-2017:0286
http://rhn.redhat.com/errata/RHSA-2017-0286.html
RHSA-2017:0574
http://rhn.redhat.com/errata/RHSA-2017-0574.html
RHSA-2017:1658
https://access.redhat.com/errata/RHSA-2017:1658
RHSA-2017:1659
http://rhn.redhat.com/errata/RHSA-2017-1659.html
RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2493
RHSA-2017:2494
https://access.redhat.com/errata/RHSA-2017:2494
[oss-security] 20161024 CVE-2016-8610: SSL Death Alert: OpenSSL SSL/TLS SSL3_AL_WARNING undefined alert Remote DoS
http://seclists.org/oss-sec/2016/q4/224
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401
https://security.360.cn/cve/CVE-2016-8610/
https://security.netapp.com/advisory/ntap-20171130-0001/
https://security.paloaltonetworks.com/CVE-2016-8610
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-3731
BugTraq ID: 95813
http://www.securityfocus.com/bid/95813
Debian Security Information: DSA-3773 (Google Search)
http://www.debian.org/security/2017/dsa-3773
FreeBSD Security Advisory: FreeBSD-SA-17:02
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc
https://security.gentoo.org/glsa/201702-07
https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
RedHat Security Advisories: RHSA-2017:0286
RedHat Security Advisories: RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2185
RedHat Security Advisories: RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2186
RedHat Security Advisories: RHSA-2018:2187
https://access.redhat.com/errata/RHSA-2018:2187
http://www.securitytracker.com/id/1037717
CopyrightCopyright (C) 2018 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.