Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.704963
Category:Debian Local Security Checks
Title:Debian: Security Advisory for openssl (DSA-4963-1)
Summary:The remote host is missing an update for the 'openssl'; package(s) announced via the DSA-4963-1 advisory.
Description:Summary:
The remote host is missing an update for the 'openssl'
package(s) announced via the DSA-4963-1 advisory.

Vulnerability Insight:
Multiple vulnerabilities have been discovered in OpenSSL, a Secure
Sockets Layer toolkit.

CVE-2021-3711
John Ouyang reported a buffer overflow vulnerability in the SM2
decryption. An attacker able to present SM2 content for
decryption to an application can take advantage of this flaw to
change application behaviour or cause the application to crash
(denial of service).

CVE-2021-3712
Ingo Schwarze reported a buffer overrun flaw when processing ASN.1
strings in the X509_aux_print() function, which can result in denial
of service.

Affected Software/OS:
'openssl' package(s) on Debian Linux.

Solution:
For the oldstable distribution (buster), these problems have been fixed
in version 1.1.1d-0+deb10u7.

For the stable distribution (bullseye), these problems have been fixed in
version 1.1.1k-1+deb11u1.

We recommend that you upgrade your openssl packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://www.openssl.org/news/secadv/20210824.txt
Debian Security Information: DSA-4963 (Google Search)
https://www.debian.org/security/2021/dsa-4963
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E
Common Vulnerability Exposure (CVE) ID: CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://security.netapp.com/advisory/ntap-20210827-0010/
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.