Lucene search

K

FreeBSD Security Advisory (FreeBSD-SA-07:08.openssl.asc)

๐Ÿ—“๏ธย 04 Sep 2008ย 00:00:00Reported byย Copyright (C) 2008 E-Soft Inc.Typeย 
openvas
ย openvas
๐Ÿ”—ย plugins.openvas.org๐Ÿ‘ย 8ย Views

FreeBSD-SA-07:08 openssl buffer overflo

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
HP-UX Update for Apache HPSBUX02292
5 May 200900:00
โ€“openvas
OpenVAS
FreeBSD Security Advisory (FreeBSD-SA-07:08.openssl.asc)
4 Sep 200800:00
โ€“openvas
OpenVAS
SLES9: Security update for OpenSSL
10 Oct 200900:00
โ€“openvas
OpenVAS
SLES10: Security update for compat-openssl097g
13 Oct 200900:00
โ€“openvas
OpenVAS
Debian Security Advisory DSA 1379-1 (openssl)
17 Jan 200800:00
โ€“openvas
OpenVAS
Debian: Security Advisory (DSA-1379-1)
17 Jan 200800:00
โ€“openvas
OpenVAS
HP-UX Update for Apache HPSBUX02292
5 May 200900:00
โ€“openvas
OpenVAS
Debian Security Advisory DSA 1379-2 (openssl097, openssl096)
17 Jan 200800:00
โ€“openvas
OpenVAS
Debian: Security Advisory (DSA-1379-1)
17 Jan 200800:00
โ€“openvas
OpenVAS
SLES9: Security update for OpenSSL
10 Oct 200900:00
โ€“openvas
Rows per page
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.58634");
  script_version("2023-07-26T05:05:09+0000");
  script_tag(name:"last_modification", value:"2023-07-26 05:05:09 +0000 (Wed, 26 Jul 2023)");
  script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2007-5135");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_name("FreeBSD Security Advisory (FreeBSD-SA-07:08.openssl.asc)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 E-Soft Inc.");
  script_family("FreeBSD Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/freebsd", "ssh/login/freebsdpatchlevel");

  script_tag(name:"insight", value:"FreeBSD includes software from the OpenSSL Project.  The OpenSSL Project is
a collaborative effort to develop a robust, commercial-grade, full-featured,
and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols as well as a full-strength
general purpose cryptography library.

A buffer overflow addressed in FreeBSD-SA-06:23.openssl has been found
to be incorrectly fixed.");

  script_tag(name:"solution", value:"Upgrade your system to the appropriate stable release
  or security branch dated after the correction date.");

  script_xref(name:"URL", value:"https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-07:08.openssl.asc");

  script_tag(name:"summary", value:"The remote host is missing an update to the system
  as announced in the referenced advisory FreeBSD-SA-07:08.openssl.asc");

  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("pkg-lib-bsd.inc");

vuln = FALSE;

if(patchlevelcmp(rel:"6.2", patchlevel:"8")<0) {
  vuln = TRUE;
}
if(patchlevelcmp(rel:"6.1", patchlevel:"20")<0) {
  vuln = TRUE;
}
if(patchlevelcmp(rel:"5.5", patchlevel:"16")<0) {
  vuln = TRUE;
}

if(vuln) {
  security_message(port:0);
} else if (__pkg_match) {
  exit(99);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
04 Sep 2008 00:00Current
8.7High risk
Vulners AI Score8.7
CVSS26.8
EPSS0.51487
8
.json
Report