Description: | Summary: The remote host is missing an update for the 'openssl' package(s) announced via the SSA:2013-040-01 advisory.
Vulnerability Insight: New openssl packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix security issues.
Here are the details from the Slackware 14.0 ChangeLog: +--------------------------+ patches/packages/openssl-1.0.1d-i486-1_slack14.0.txz: Upgraded. Make the decoding of SSLv3, TLS and DTLS CBC records constant time. This addresses the flaw in CBC record processing discovered by Nadhem Alfardan and Kenny Paterson. Details of this attack can be found at: [link moved to references] Thanks go to Nadhem Alfardan and Kenny Paterson of the Information Security Group at Royal Holloway, University of London (www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and Emilia Kasper for the initial patch. (CVE-2013-0169) [Emilia Kasper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson] Fix flaw in AESNI handling of TLS 1.2 and 1.1 records for CBC mode ciphersuites which can be exploited in a denial of service attack. Thanks go to and to Adam Langley for discovering and detecting this bug and to Wolfgang Ettlinger for independently discovering this issue. (CVE-2012-2686) [Adam Langley] Return an error when checking OCSP signatures when key is NULL. This fixes a DoS attack. (CVE-2013-0166) [Steve Henson] For more information, see: [links moved to references] (* Security fix *) patches/packages/openssl-solibs-1.0.1d-i486-1_slack14.0.txz: Upgraded. (* Security fix *) +--------------------------+
Affected Software/OS: 'openssl' package(s) on Slackware 12.1, Slackware 12.2, Slackware 13.0, Slackware 13.1, Slackware 13.37, Slackware 14.0, Slackware current.
Solution: Please install the updated package(s).
CVSS Score: 5.0
CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
|