5.6 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.013 Low
EPSS
Percentile
85.5%
CentOS Errata and Security Advisory CESA-2005:800
OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and
Transport Layer Security (TLS v1) protocols as well as a full-strength
general purpose cryptography library.
OpenSSL contained a software work-around for a bug in SSL handling in
Microsoft Internet Explorer version 3.0.2. This work-around is enabled in
most servers that use OpenSSL to provide support for SSL and TLS. Yutaka
Oiwa discovered that this work-around could allow an attacker, acting as a
“man in the middle” to force an SSL connection to use SSL 2.0 rather than a
stronger protocol such as SSL 3.0 or TLS 1.0. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CAN-2005-2969
to this issue.
A bug was also fixed in the way OpenSSL creates DSA signatures. A cache
timing attack was fixed in RHSA-2005-476 which caused OpenSSL to do private
key calculations with a fixed time window. The DSA fix for this was not
complete and the calculations are not always performed within a
fixed-window. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0109 to this issue.
Users are advised to upgrade to these updated packages, which remove the
MISE 3.0.2 work-around and contain patches to correct these issues.
Note: After installing this update, users are advised to either
restart all services that use OpenSSL or restart their system.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-October/074425.html
https://lists.centos.org/pipermail/centos-announce/2005-October/074428.html
https://lists.centos.org/pipermail/centos-announce/2005-October/074435.html
https://lists.centos.org/pipermail/centos-announce/2005-October/074436.html
https://lists.centos.org/pipermail/centos-announce/2005-October/074440.html
https://lists.centos.org/pipermail/centos-announce/2005-October/074447.html
Affected packages:
openssl
openssl-devel
openssl-perl
openssl096b
Upstream details at:
https://access.redhat.com/errata/RHSA-2005:800
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 3 | ia64 | openssl | < 0.9.7a-33.17 | openssl-0.9.7a-33.17.ia64.rpm |
CentOS | 3 | ia64 | openssl-devel | < 0.9.7a-33.17 | openssl-devel-0.9.7a-33.17.ia64.rpm |
CentOS | 3 | ia64 | openssl-perl | < 0.9.7a-33.17 | openssl-perl-0.9.7a-33.17.ia64.rpm |
CentOS | 3 | ia64 | openssl096b | < 0.9.6b-16.22.4 | openssl096b-0.9.6b-16.22.4.ia64.rpm |
CentOS | 4 | ia64 | openssl | < 0.9.7a-43.4 | openssl-0.9.7a-43.4.ia64.rpm |
CentOS | 4 | ia64 | openssl-devel | < 0.9.7a-43.4 | openssl-devel-0.9.7a-43.4.ia64.rpm |
CentOS | 4 | ia64 | openssl-perl | < 0.9.7a-43.4 | openssl-perl-0.9.7a-43.4.ia64.rpm |
CentOS | 4 | ia64 | openssl096b | < 0.9.6b-22.4 | openssl096b-0.9.6b-22.4.ia64.rpm |
CentOS | 3 | i386 | openssl | < 0.9.7a-33.17 | openssl-0.9.7a-33.17.i386.rpm |
CentOS | 3 | i686 | openssl | < 0.9.7a-33.17 | openssl-0.9.7a-33.17.i686.rpm |
5.6 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.013 Low
EPSS
Percentile
85.5%