Full Disclosure mailing list archives

rPSA-2006-0175-2 openssl openssl-scripts


From: rPath Update Announcements <announce-noreply () rpath com>
Date: Fri, 29 Sep 2006 16:50:47 -0400

rPath Security Advisory: 2006-0175-2
Published: 2006-09-28
Updated:
    2006-09-29 Resolved issue in patch for CVE-2006-2940
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
    Remote Deterministic Unauthorized Access
Updated Versions:
    openssl=/conary.rpath.com@rpl:devel//1/0.9.7f-10.5-1
    openssl-scripts=/conary.rpath.com@rpl:devel//1/0.9.7f-10.5-1

References:
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343
    http://issues.rpath.com/browse/RPL-613

Description:
    Previous versions of the openssl package are vulnerable to multiple
    attacks.  Three of the vulnerabilities are denials of service,
    but the other is a buffer overflow that is expected to create
    remote unauthorized access vulnerabilities in other applications.
    In particular, any connection that the mysql daemon will accept
    may be vulnerable.  In the default configuration of mysql, that
    would be a local unauthorized access vulnerability, but mysql can
    be configured to listen for network connections from remote hosts,
    which would then enable remote unauthorized access.  Any program
    that calls the SSL_get_shared_ciphers() function may be vulnerable.
    
    29 September 2006 Update: The initial fix for this vulnerability was
    incomplete, and the fault in the fix could enable a Denial of Service
    attack in some cases of the attack described in CVE-2006-2940.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: