Summary
The remote host is missing an update to openssl
announced via advisory DSA 1173-1.
Daniel Bleichenbacher discovered a flaw in OpenSSL cryptographic package that could allow an attacker to generate a forged signature that OpenSSL will accept as valid.
Solution
For the stable distribution (sarge) this problem has been fixed in version 0.9.7e-3sarge2
For the unstable distribution (sid) this problem has been fixed in version 0.9.8b-3
We recommend that you upgrade your openssl packages. Note that services
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201173-1
Severity
Classification
-
CVE CVE-2006-4339 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:P/I:N/A:N
Related Vulnerabilities