rPath Information for VU#386964
OpenSSL SSLv2 client code fails to properly check for NULL
- Vendor Information Help Date Notified:
- Statement Date: 29 Sep 2006
- Date Updated: 02 Oct 2006
rPath Security Advisory: 2006-0175-5
2006-09-29 Resolved issue in patch for CVE-2006-2940
Products: rPath Linux 1
Exposure Level Classification:
Remote Deterministic Unauthorized Access
openssl=/conary.rpath.com at rpl:devel//1/0.9.7f-10.6-1
openssl-scripts=/conary.rpath.com at rpl:devel//1/0.9.7f-10.6-1
Previous versions of the openssl package are vulnerable to multiple
attacks. Three of the vulnerabilities are denials of service,
but the other is a buffer overflow that is expected to create
remote unauthorized access vulnerabilities in other applications.
In particular, any connection that the mysql daemon will accept
may be vulnerable. In the default configuration of mysql, that
would be a local unauthorized access vulnerability, but mysql can
be configured to listen for network connections from remote hosts,
which would then enable remote unauthorized access. Any program
that calls the SSL_get_shared_ciphers() function may be vulnerable.
29 September 2006 Update: The initial fix for this vulnerability was
incomplete, and the fault in the fix could enable a Denial of Service
attack in some cases of the attack described in CVE-2006-2940.
We are not aware of further vendor information regarding this vulnerability.
There are no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.