Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Debian Local Security Checks --> Category: infos

[DSA393] DSA-393-1 openssl Vulnerability Scan

Vulnerability Scan Summary
DSA-393-1 openssl

Detailed Explanation for this Vulnerability Test

Dr. Stephen Henson (""), using a test suite
provided by NISCC (""), discovered a number of
errors in the OpenSSL
ASN1 code. Combined with an error that causes the OpenSSL code to parse
client certificates even when it should not, these errors can cause a
denial of service (DoS) condition on a system using the OpenSSL code,
depending on how that code is used. For example, even though apache-ssl
and ssh link to OpenSSL libraries, they should not be affected by this
vulnerability. However, other SSL-enabled applications may be
vulnerable and an OpenSSL upgrade is recommended.
For the current stable distribution (woody) these problems have been
fixed in version 0.9.6c-2.woody.4.
For the unstable distribution (sid) these problems have been fixed in
version 0.9.7c-1.
We recommend that you update your openssl package. Note that you will
need to restart services which use the libssl library for this update
to take effect.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.