Description: | Summary: The remote host is missing an update for the 'openssl' package(s) announced via the USN-6622-1 advisory.
Vulnerability Insight: David Benjamin discovered that OpenSSL incorrectly handled excessively long X9.42 DH keys. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. (CVE-2023-5678)
Sverker Eriksson discovered that OpenSSL incorrectly handled POLY1304 MAC on the PowerPC architecture. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-6129)
It was discovered that OpenSSL incorrectly handled excessively long RSA public keys. A remote attacker could possibly use this issue to cause OpenSSL to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.04. (CVE-2023-6237)
Bahaa Naamneh discovered that OpenSSL incorrectly handled certain malformed PKCS12 files. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2024-0727)
Affected Software/OS: 'openssl' package(s) on Ubuntu 20.04, Ubuntu 22.04, Ubuntu 23.10.
Solution: Please install the updated package(s).
CVSS Score: 6.1
CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:C
|