Vulnerability & Exploit Database

Back to search

RHSA-2012:0699: openssl security and bug fix update

Severity CVSS Published Added Modified
7 (AV:N/AC:M/Au:N/C:P/I:P/A:P) May 14, 2012 June 11, 2012 July 04, 2017


OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)and Transport Layer Security (TLS v1) protocols, as well as afull-strength, general purpose cryptography library.An integer underflow flaw, leading to a buffer over-read, was found in theway OpenSSL handled DTLS (Datagram Transport Layer Security) applicationdata record lengths when using a block cipher in CBC (cipher-blockchaining) mode. A malicious DTLS client or server could use this flaw tocrash its DTLS connection peer. (CVE-2012-2333)Red Hat would like to thank the OpenSSL project for reporting this issue.Upstream acknowledges Codenomicon as the original reporter.On Red Hat Enterprise Linux 6, this update also fixes an uninitializedvariable use bug, introduced by the fix for CVE-2012-0884 (released viaRHSA-2012:0426). This bug could possibly cause an attempt to create anencrypted message in the CMS (Cryptographic Message Syntax) format to fail.All OpenSSL users should upgrade to these updated packages, which contain abackported patch to resolve these issues. For the update to take effect,all services linked to the OpenSSL library must be restarted, or the systemrebooted.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial




Related Vulnerabilities