Summary
The remote host is missing an update to openssl
announced via advisory DSA 288-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20288-1
Insight
Researchers discovered two flaws in OpenSSL, a Secure Socket Layer (SSL) library and related cryptographic tools. Applications that are linked against this library are generally vulnerable to attacks that could leak the server's private key or make the encrypted session decryptable otherwise. The Common Vulnerabilities and Exposures (CVE) project identified the following vulnerabilities:
CVE-2003-0147
OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the server's private key.
CVE-2003-0131
The SSL and allow remote attackers to perform an unauthorized RSA private key operation that cause OpenSSL to leak information regarding the relationship between ciphertext and the associated plaintext.
For the stable distribution (woody) these problems have been fixed in version 0.9.6c-2.woody.3.
For the old stable distribution (potato) these problems have been fixed in version 0.9.6c-0.potato.6.
For the unstable distribution (sid) these problems have been fixed in version 0.9.7b-1 of openssl and version 0.9.6j-1 of openssl096.
We recommend that you upgrade your openssl packages immediately and
Severity
Classification
-
CVE CVE-2003-0131, CVE-2003-0147 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities