Lucene search

K
centosCentOS ProjectCESA-2010:0173
HistoryMar 25, 2010 - 10:40 p.m.

openssl096b security update

2010-03-2522:40:26
CentOS Project
lists.centos.org
45

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.012 Low

EPSS

Percentile

85.3%

CentOS Errata and Security Advisory CESA-2010:0173

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library.

It was discovered that OpenSSL did not always check the return value of the
bn_wexpand() function. An attacker able to trigger a memory allocation
failure in that function could cause an application using the OpenSSL
library to crash or, possibly, execute arbitrary code. (CVE-2009-3245)

All openssl096b users should upgrade to these updated packages, which
contain a backported patch to resolve this issue. For the update to take
effect, all programs using the openssl096b library must be restarted.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-March/078744.html
https://lists.centos.org/pipermail/centos-announce/2010-March/078745.html
https://lists.centos.org/pipermail/centos-announce/2010-March/078773.html
https://lists.centos.org/pipermail/centos-announce/2010-March/078774.html

Affected packages:
openssl096b

Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0173

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.012 Low

EPSS

Percentile

85.3%