5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
0.007 Low
EPSS
Percentile
80.7%
CentOS Errata and Security Advisory CESA-2009:0004
OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and
Transport Layer Security (TLS v1) protocols as well as a full-strength,
general purpose, cryptography library.
The Google security team discovered a flaw in the way OpenSSL checked the
verification of certificates. An attacker in control of a malicious server,
or able to effect a “man in the middle” attack, could present a malformed
SSL/TLS signature from a certificate chain to a vulnerable client and
bypass validation. (CVE-2008-5077)
All OpenSSL users should upgrade to these updated packages, which contain
backported patches to resolve these issues. For the update to take effect,
all running OpenSSL client applications must be restarted, or the system
rebooted.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2009-February/077758.html
https://lists.centos.org/pipermail/centos-announce/2009-February/077760.html
https://lists.centos.org/pipermail/centos-announce/2009-February/077773.html
https://lists.centos.org/pipermail/centos-announce/2009-February/077777.html
https://lists.centos.org/pipermail/centos-announce/2009-January/077684.html
https://lists.centos.org/pipermail/centos-announce/2009-January/077685.html
https://lists.centos.org/pipermail/centos-announce/2009-January/077694.html
https://lists.centos.org/pipermail/centos-announce/2009-January/077695.html
https://lists.centos.org/pipermail/centos-announce/2009-January/077724.html
https://lists.centos.org/pipermail/centos-announce/2009-January/077725.html
https://lists.centos.org/pipermail/centos-announce/2009-January/090451.html
https://lists.centos.org/pipermail/centos-announce/2009-January/090452.html
Affected packages:
openssl
openssl-devel
openssl-perl
openssl096b
openssl097a
Upstream details at:
https://access.redhat.com/errata/RHSA-2009:0004
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 3 | i386 | openssl096b | < 0.9.6b-16.49 | openssl096b-0.9.6b-16.49.i386.rpm |
CentOS | 3 | i386 | openssl | < 0.9.7a-33.25 | openssl-0.9.7a-33.25.i386.rpm |
CentOS | 3 | i686 | openssl | < 0.9.7a-33.25 | openssl-0.9.7a-33.25.i686.rpm |
CentOS | 3 | i386 | openssl-devel | < 0.9.7a-33.25 | openssl-devel-0.9.7a-33.25.i386.rpm |
CentOS | 3 | i386 | openssl-perl | < 0.9.7a-33.25 | openssl-perl-0.9.7a-33.25.i386.rpm |
CentOS | 3 | i386 | openssl096b | < 0.9.6b-16.49 | openssl096b-0.9.6b-16.49.i386.rpm |
CentOS | 3 | i386 | openssl | < 0.9.7a-33.25 | openssl-0.9.7a-33.25.i386.rpm |
CentOS | 3 | i686 | openssl | < 0.9.7a-33.25 | openssl-0.9.7a-33.25.i686.rpm |
CentOS | 3 | i386 | openssl-devel | < 0.9.7a-33.25 | openssl-devel-0.9.7a-33.25.i386.rpm |
CentOS | 3 | i386 | openssl-perl | < 0.9.7a-33.25 | openssl-perl-0.9.7a-33.25.i386.rpm |