Summary
The remote host is missing an update to openssl
announced via advisory DSA 253-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20253-1
Insight
A vulnerability has been discovered in OpenSSL, a Secure Socket Layer (SSL) implementation. In an upcoming paper, Brice Canvel (EPFL), Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux (EPFL, Ilion) describe and demonstrate a timing-based attack on CBC cipher suites used in SSL and TLS. OpenSSL has been found to vulnerable to this attack.
For the stable distribution (woody) this problem has been fixed in version 0.9.6c-2.woody.2.
For the old stable distribution (potato) this problem has been fixed in version 0.9.6c-0.potato.5. Please note that this updates the version from potato-proposed-updates that superseds the version in potato.
For the unstable distribution (sid) this problem has been fixed in version 0.9.7a-1.
We recommend that you upgrade your openssl packages.
Severity
Classification
-
CVE CVE-2003-0078 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities