rPath Security Advisory: 2006-0175-1
Published: 2006-09-28
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
    Remote Deterministic Unauthorized Access
Updated Versions:
    openssl=/[EMAIL PROTECTED]:devel//1/0.9.7f-10.4-1
    openssl-scripts=/[EMAIL PROTECTED]:devel//1/0.9.7f-10.4-1

References:
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343
    http://issues.rpath.com/browse/RPL-613

Description:
    Previous versions of the openssl package are vulnerable to multiple
    attacks.  Three of the vulnerabilities are denials of service,
    but the other is a buffer overflow that is expected to create
    remote unauthorized access vulnerabilities in other applications.
    In particular, any connection that the mysql daemon will accept
    may be vulnerable.  In the default configuration of mysql, that
    would be a local unauthorized access vulnerability, but mysql can
    be configured to listen for network connections from remote hosts,
    which would then enable remote unauthorized access.  Any program
    that calls the SSL_get_shared_ciphers() function may be vulnerable.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to