|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2015:0841-1)|
|Summary:||The remote host is missing an update for the 'Mono' package(s) announced via the SUSE-SU-2015:0841-1 advisory.|
The remote host is missing an update for the 'Mono' package(s) announced via the SUSE-SU-2015:0841-1 advisory.
Multiple SSL vulnerabilities were fixed in the Mono TLS implementation.
CVE-2015-2318: SKIP-TLS problem could be used to client impersonification.
CVE-2015-2319: A FREAK style SSL protocol downgrade problem was fixed.
CVE-2015-2320: The SSLv2 support was disabled.
'Mono' package(s) on SUSE Linux Enterprise Software Development Kit 11 SP3, SUSE Linux Enterprise Server 11 SP3, SUSE Linux Enterprise Desktop 11 SP3
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2015-2318|
BugTraq ID: 73253
Debian Security Information: DSA-3202 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2015-2319
BugTraq ID: 73250
Common Vulnerability Exposure (CVE) ID: CVE-2015-2320
BugTraq ID: 73256
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.