CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
EPSS
Percentile
97.8%
CentOS Errata and Security Advisory CESA-2007:0813-01
OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and
Transport Layer Security (TLS v1) protocols as well as a full-strength
general purpose cryptography library.
A flaw was found in the SSL_get_shared_ciphers() utility function. An
attacker could send a list of ciphers to an application that used this
function and overrun a buffer with a single byte (CVE-2007-5135). Few
applications make use of this vulnerable function and generally it is used
only when applications are compiled for debugging.
A number of possible side-channel attacks were discovered affecting
OpenSSL. A local attacker could possibly obtain RSA private keys being
used on a system. In practice these attacks would be difficult to perform
outside of a lab environment. This update contains backported patches
designed to mitigate these issues. (CVE-2007-3108).
Users of OpenSSL should upgrade to these updated packages, which contain
backported patches to resolve these issues.
Note: After installing this update, users are advised to either restart all
services that use OpenSSL or restart their system.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-October/076498.html
Affected packages:
openssl
openssl-devel
openssl-perl
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 2 | i386 | openssl | < 0.9.6b-48 | openssl-0.9.6b-48.i386.rpm |
CentOS | 2 | i386 | openssl-devel | < 0.9.6b-48 | openssl-devel-0.9.6b-48.i386.rpm |
CentOS | 2 | i386 | openssl-perl | < 0.9.6b-48 | openssl-perl-0.9.6b-48.i386.rpm |
CentOS | 2 | i686 | openssl | < 0.9.6b-48 | openssl-0.9.6b-48.i686.rpm |