rPath Information for VU#547300

OpenSSL SSL_get_shared_ciphers() vulnerable to buffer overflow

Status

Affected

Vendor Statement

rPath Security Advisory: 2006-0175-5
Published: 2006-09-28
Updated:
   2006-09-29 Resolved issue in patch for CVE-2006-2940
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
   Remote Deterministic Unauthorized Access
Updated Versions:
   openssl=/
conary.rpath.com at rpl:devel//1/0.9.7f-10.6-1
   openssl-scripts=/
conary.rpath.com at rpl:devel//1/0.9.7f-10.6-1

References:
   
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937
   
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940
   
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738
   
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343
   
http://issues.rpath.com/browse/RPL-613

Description:
   Previous versions of the openssl package are vulnerable to multiple
   attacks.  Three of the vulnerabilities are denials of service,
   but the other is a buffer overflow that is expected to create
   remote unauthorized access vulnerabilities in other applications.
   In particular, any connection that the mysql daemon will accept
   may be vulnerable.  In the default configuration of mysql, that
   would be a local unauthorized access vulnerability, but mysql can
   be configured to listen for network connections from remote hosts,
   which would then enable remote unauthorized access.  Any program
   that calls the SSL_get_shared_ciphers() function may be vulnerable.
   
   29 September 2006 Update: The initial fix for this vulnerability was
   incomplete, and the fault in the fix could enable a Denial of Service
   attack in some cases of the attack described in CVE-2006-2940.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

None

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.