Summary
The remote host is missing an update to openssl
announced via advisory DSA 393-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20393-1
Insight
Dr. Stephen Henson (steve@openssl.org), using a test suite provided by NISCC (www.niscc.gov.uk), discovered a number of errors in the OpenSSL ASN1 code. Combined with an error that causes the OpenSSL code to parse client certificates even when it should not, these errors can cause a denial of service (DoS) condition on a system using the OpenSSL code, depending on how that code is used. For example, even though apache-ssl and ssh link to OpenSSL libraries, they should not be affected by this vulnerability. However, other SSL-enabled applications may be vulnerable and an OpenSSL upgrade is recommended.
For the current stable distribution (woody) these problems have been fixed in version 0.9.6c-2.woody.4
For the unstable distribution (sid) these problems have been fixed in version 0.9.7c-1
We recommend that you update your openssl package. Note that you will need to restart services which use the libssl library for this update to take effect.
Severity
Classification
-
CVE CVE-2003-0543, CVE-2003-0544 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities