Summary
The remote host is missing an update to openssl, openssl097 announced via advisory DSA 1888-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201888-1
Insight
Certificates with MD2 hash signatures are no longer accepted by OpenSSL, since they're no longer considered cryptographically secure.
For the stable distribution (lenny), this problem has been fixed in version 0.9.8g-15+lenny5.
For the old stable distribution (etch), this problem has been fixed in version 0.9.8c-4etch9 for openssl and version 0.9.7k-3.1etch5 for openssl097.
The OpenSSL 0.9.8 update for oldstable (etch) also provides updated packages for multiple denial of service vulnerabilities in the Datagram Transport Layer Security implementation. These fixes were already provided for Debian stable (Lenny) in a previous point update. The OpenSSL 0.9.7 package from oldstable (Etch) is not affected. (CVE-2009-1377, CVE-2009-1378, CVE-2009-1379, CVE-2009-1386 and CVE-2009-1387)
For the unstable distribution (sid), this problem has been fixed in version 0.9.8k-5.
We recommend that you upgrade your openssl packages.
Severity
Classification
-
CVE CVE-2009-1377, CVE-2009-1378, CVE-2009-1379, CVE-2009-1386, CVE-2009-1387, CVE-2009-2409 -
CVSS Base Score: 5.1
AV:N/AC:H/Au:N/C:P/I:P/A:P
Related Vulnerabilities