Summary
The remote host is missing an update to openssl
announced via advisory USN-704-1.
It was discovered that OpenSSL did not properly perform signature verification on DSA and ECDSA keys. If user or automated system connected to a malicious server or a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to view sensitive information.
Solution
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS:
libssl0.9.8 0.9.8a-7ubuntu0.6
openssl 0.9.8a-7ubuntu0.6
Ubuntu 7.10:
libssl0.9.8 0.9.8e-5ubuntu3.3
openssl 0.9.8e-5ubuntu3.3
Ubuntu 8.04 LTS:
libssl0.9.8 0.9.8g-4ubuntu3.4
openssl 0.9.8g-4ubuntu3.4
Ubuntu 8.10:
libssl0.9.8 0.9.8g-10.1ubuntu2.1 openssl 0.9.8g-10.1ubuntu2.1
After a standard system upgrade you need to reboot your computer to effect the necessary changes.
https://secure1.securityspace.com/smysecure/catid.html?in=USN-704-1
Severity
Classification
-
CVE CVE-2008-5077 -
CVSS Base Score: 5.8
AV:N/AC:M/Au:N/C:N/I:P/A:P
Related Vulnerabilities