Lucene search

K

Amazon Linux AMI : openssl (ALAS-2012-85)

๐Ÿ—“๏ธย 04 Sep 2013ย 00:00:00Reported byย This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.Typeย 
nessus
ย nessus
๐Ÿ”—ย www.tenable.com๐Ÿ‘ย 33ย Views

The remote Amazon Linux AMI host is missing a security update. An integer underflow flaw in OpenSSL could lead to a buffer over-read, potentially crashing a DTLS connection peer. (CVE-2012-2333

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
Fedora Update for openssl FEDORA-2012-7939
30 Aug 201200:00
โ€“openvas
OpenVAS
Mandriva Update for openssl MDVSA-2012:073 (openssl)
3 Aug 201200:00
โ€“openvas
OpenVAS
SUSE: Security Advisory (SUSE-SU-2012:0678-1)
9 Jun 202100:00
โ€“openvas
OpenVAS
Mandriva Update for openssl MDVSA-2012:073 (openssl)
3 Aug 201200:00
โ€“openvas
OpenVAS
FreeBSD Ports: openssl
31 May 201200:00
โ€“openvas
OpenVAS
Amazon Linux: Security Advisory (ALAS-2012-85)
8 Sep 201500:00
โ€“openvas
OpenVAS
Debian Security Advisory DSA 2475-1 (openssl)
31 May 201200:00
โ€“openvas
OpenVAS
FreeBSD Ports: openssl
31 May 201200:00
โ€“openvas
OpenVAS
OpenSSL: Invalid TLS/DTLS Record Attack (20120510) - Windows
16 Aug 202100:00
โ€“openvas
OpenVAS
SUSE: Security Advisory (SUSE-SU-2012:0679-1)
9 Jun 202100:00
โ€“openvas
Rows per page
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Amazon Linux AMI Security Advisory ALAS-2012-85.
#

include("compat.inc");

if (description)
{
  script_id(69692);
  script_version("1.5");
  script_cvs_date("Date: 2018/04/18 15:09:34");

  script_cve_id("CVE-2012-2333");
  script_xref(name:"ALAS", value:"2012-85");
  script_xref(name:"RHSA", value:"2012:0699");

  script_name(english:"Amazon Linux AMI : openssl (ALAS-2012-85)");
  script_summary(english:"Checks rpm output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Amazon Linux AMI host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"An integer underflow flaw, leading to a buffer over-read, was found in
the way OpenSSL handled DTLS (Datagram Transport Layer Security)
application data record lengths when using a block cipher in CBC
(cipher-block chaining) mode. A malicious DTLS client or server could
use this flaw to crash its DTLS connection peer. (CVE-2012-2333)"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://alas.aws.amazon.com/ALAS-2012-85.html"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Run 'yum update openssl' to update your system."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:openssl");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:openssl-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:openssl-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:openssl-perl");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:openssl-static");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:amazon:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2012/06/10");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/04");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
  script_family(english:"Amazon Linux Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/AmazonLinux/release", "Host/AmazonLinux/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);

release = get_kb_item("Host/AmazonLinux/release");
if (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, "Amazon Linux");
os_ver = pregmatch(pattern: "^AL(A|\d)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Amazon Linux");
os_ver = os_ver[1];
if (os_ver != "A")
{
  if (os_ver == 'A') os_ver = 'AMI';
  audit(AUDIT_OS_NOT, "Amazon Linux AMI", "Amazon Linux " + os_ver);
}

if (!get_kb_item("Host/AmazonLinux/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (rpm_check(release:"ALA", reference:"openssl-1.0.0j-1.43.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"openssl-debuginfo-1.0.0j-1.43.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"openssl-devel-1.0.0j-1.43.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"openssl-perl-1.0.0j-1.43.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"openssl-static-1.0.0j-1.43.amzn1")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openssl / openssl-debuginfo / openssl-devel / openssl-perl / etc");
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
04 Sep 2013 00:00Current
8.1High risk
Vulners AI Score8.1
CVSS26.8
EPSS0.05604
33
.json
Report