Lucene search

K

Amazon Linux: Security Advisory (ALAS-2012-85)

๐Ÿ—“๏ธย 08 Sep 2015ย 00:00:00Reported byย Copyright (C) 2015 Greenbone AGTypeย 
openvas
ย openvas
๐Ÿ”—ย plugins.openvas.org๐Ÿ‘ย 22ย Views

Amazon Linux: Security Advisory (ALAS-2012-85) for 'openssl' package with integer underflow fla

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
Fedora Update for openssl FEDORA-2012-7939
30 Aug 201200:00
โ€“openvas
OpenVAS
Mandriva Update for openssl MDVSA-2012:073 (openssl)
3 Aug 201200:00
โ€“openvas
OpenVAS
Mandriva Update for openssl MDVSA-2012:073 (openssl)
3 Aug 201200:00
โ€“openvas
OpenVAS
SUSE: Security Advisory (SUSE-SU-2012:0678-1)
9 Jun 202100:00
โ€“openvas
OpenVAS
FreeBSD Ports: openssl
31 May 201200:00
โ€“openvas
OpenVAS
OpenSSL: Invalid TLS/DTLS Record Attack (20120510) - Linux
16 Aug 202100:00
โ€“openvas
OpenVAS
Fedora Update for openssl FEDORA-2012-7939
30 Aug 201200:00
โ€“openvas
OpenVAS
Debian Security Advisory DSA 2475-1 (openssl)
31 May 201200:00
โ€“openvas
OpenVAS
FreeBSD Ports: openssl
31 May 201200:00
โ€“openvas
OpenVAS
OpenSSL: Invalid TLS/DTLS Record Attack (20120510) - Windows
16 Aug 202100:00
โ€“openvas
Rows per page
# SPDX-FileCopyrightText: 2015 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.120130");
  script_cve_id("CVE-2012-2333");
  script_tag(name:"creation_date", value:"2015-09-08 11:18:13 +0000 (Tue, 08 Sep 2015)");
  script_version("2025-01-23T05:37:38+0000");
  script_tag(name:"last_modification", value:"2025-01-23 05:37:38 +0000 (Thu, 23 Jan 2025)");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");

  script_name("Amazon Linux: Security Advisory (ALAS-2012-85)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2015 Greenbone AG");
  script_family("Amazon Linux Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/amazon_linux", "ssh/login/release");

  script_xref(name:"Advisory-ID", value:"ALAS-2012-85");
  script_xref(name:"URL", value:"https://alas.aws.amazon.com/ALAS-2012-85.html");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'openssl' package(s) announced via the ALAS-2012-85 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"An integer underflow flaw, leading to a buffer over-read, was found in the way OpenSSL handled DTLS (Datagram Transport Layer Security) application data record lengths when using a block cipher in CBC (cipher-block chaining) mode. A malicious DTLS client or server could use this flaw to crash its DTLS connection peer. (CVE-2012-2333)");

  script_tag(name:"affected", value:"'openssl' package(s) on Amazon Linux.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "AMAZON") {

  if(!isnull(res = isrpmvuln(pkg:"openssl", rpm:"openssl~1.0.0j~1.43.amzn1", rls:"AMAZON"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"openssl-debuginfo", rpm:"openssl-debuginfo~1.0.0j~1.43.amzn1", rls:"AMAZON"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"openssl-devel", rpm:"openssl-devel~1.0.0j~1.43.amzn1", rls:"AMAZON"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"openssl-perl", rpm:"openssl-perl~1.0.0j~1.43.amzn1", rls:"AMAZON"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"openssl-static", rpm:"openssl-static~1.0.0j~1.43.amzn1", rls:"AMAZON"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
08 Sep 2015 00:00Current
7.9High risk
Vulners AI Score7.9
CVSS26.8
EPSS0.05604
22
.json
Report