5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.117 Low
EPSS
Percentile
94.5%
Certificates with MD2 hash signatures are no longer accepted by OpenSSL,
since they’re no longer considered cryptographically secure.
For the stable distribution (lenny), this problem has been fixed in
version 0.9.8g-15+lenny5.
For the old stable distribution (etch), this problem has been fixed in
version 0.9.8c-4etch9 for openssl and version 0.9.7k-3.1etch5 for
openssl097.
The OpenSSL 0.9.8 update for oldstable (etch) also provides updated
packages for multiple denial of service vulnerabilities in the
Datagram Transport Layer Security implementation. These fixes were
already provided for Debian stable (Lenny) in a previous point
update. The OpenSSL 0.9.7 package from oldstable (Etch) is not
affected. (CVE-2009-1377, CVE-2009-1378, CVE-2009-1379,
CVE-2009-1386 and CVE-2009-1387)
For the unstable distribution (sid), this problem has been fixed in
version 0.9.8k-5.
We recommend that you upgrade your openssl packages.
CPE | Name | Operator | Version |
---|---|---|---|
openssl | eq | 0.9.8g-15 | |
openssl | eq | 0.9.8g-15+lenny1 | |
openssl | eq | 0.9.8g-15+lenny3 |