Vulnerability & Exploit Database

Back to search

RHSA-2012:0699: openssl security and bug fix update

Severity CVSS Published Added Modified
7 (AV:N/AC:M/Au:N/C:P/I:P/A:P) May 14, 2012 June 11, 2012 July 04, 2017

Description

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)and Transport Layer Security (TLS v1) protocols, as well as afull-strength, general purpose cryptography library.An integer underflow flaw, leading to a buffer over-read, was found in theway OpenSSL handled DTLS (Datagram Transport Layer Security) applicationdata record lengths when using a block cipher in CBC (cipher-blockchaining) mode. A malicious DTLS client or server could use this flaw tocrash its DTLS connection peer. (CVE-2012-2333)Red Hat would like to thank the OpenSSL project for reporting this issue.Upstream acknowledges Codenomicon as the original reporter.On Red Hat Enterprise Linux 6, this update also fixes an uninitializedvariable use bug, introduced by the fix for CVE-2012-0884 (released viaRHSA-2012:0426). This bug could possibly cause an attempt to create anencrypted message in the CMS (Cryptographic Message Syntax) format to fail.All OpenSSL users should upgrade to these updated packages, which contain abackported patch to resolve these issues. For the update to take effect,all services linked to the OpenSSL library must be restarted, or the systemrebooted.

Free Nexpose Download

Discover, prioritize, and remediate security risks today!

 Download now

References

Solution

redhat-upgrade-openssl

Related Vulnerabilities