Lucene search

K
centosCentOS ProjectCESA-2012:0518
HistoryApr 25, 2012 - 1:22 a.m.

openssl, openssl097a, openssl098e security update

2012-04-2501:22:21
CentOS Project
lists.centos.org
64

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.108

Percentile

95.2%

CentOS Errata and Security Advisory CESA-2012:0518

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library.

Multiple numeric conversion errors, leading to a buffer overflow, were
found in the way OpenSSL parsed ASN.1 (Abstract Syntax Notation One) data
from BIO (OpenSSL’s I/O abstraction) inputs. Specially-crafted DER
(Distinguished Encoding Rules) encoded data read from a file or other BIO
input could cause an application using the OpenSSL library to crash or,
potentially, execute arbitrary code. (CVE-2012-2110)

All OpenSSL users should upgrade to these updated packages, which contain
a backported patch to resolve this issue. For the update to take effect,
all services linked to the OpenSSL library must be restarted, or the system
rebooted.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2012-April/080754.html
https://lists.centos.org/pipermail/centos-announce/2012-April/080758.html

Affected packages:
openssl
openssl-devel
openssl-perl
openssl-static
openssl097a
openssl098e

Upstream details at:
https://access.redhat.com/errata/RHSA-2012:0518

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.108

Percentile

95.2%