lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <451c2a46.NLTCV1ZokK5uwUFb%announce-noreply@rpath.com>
Date: Thu, 28 Sep 2006 16:02:14 -0400
From: rPath Update Announcements <announce-noreply@...th.com>
To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: rPSA-2006-0175-1 openssl openssl-scripts

rPath Security Advisory: 2006-0175-1
Published: 2006-09-28
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
    Remote Deterministic Unauthorized Access
Updated Versions:
    openssl=/conary.rpath.com@rpl:devel//1/0.9.7f-10.4-1
    openssl-scripts=/conary.rpath.com@rpl:devel//1/0.9.7f-10.4-1

References:
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343
    http://issues.rpath.com/browse/RPL-613

Description:
    Previous versions of the openssl package are vulnerable to multiple
    attacks.  Three of the vulnerabilities are denials of service,
    but the other is a buffer overflow that is expected to create
    remote unauthorized access vulnerabilities in other applications.
    In particular, any connection that the mysql daemon will accept
    may be vulnerable.  In the default configuration of mysql, that
    would be a local unauthorized access vulnerability, but mysql can
    be configured to listen for network connections from remote hosts,
    which would then enable remote unauthorized access.  Any program
    that calls the SSL_get_shared_ciphers() function may be vulnerable.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ