Date: Wed, 17 Mar 2004 09:49:59 -0500 (EST)
From: EnGarde Secure Linux <[email protected]>
To: [email protected], [email protected]Subject: [ESA-20040317-003] 'openssl' Denial of Service vulnerabilities.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
+------------------------------------------------------------------------+
| Guardian Digital Security Advisory March 17, 2004 |
| http://www.guardiandigital.com ESA-20040317-003 |
| |
| Packages: openssl, openssl-misc |
| Summary: Denial of Service vulnerabilities. |
+------------------------------------------------------------------------+
EnGarde Secure Linux is an enterprise class Linux platform engineered
to enable corporations to quickly and cost-effectively build a complete
and secure Internet presence while preventing Internet threats.
OVERVIEW
- --------
Using a commercial TLS protocol testing suite the OpenSSL Project
discovered three vulnerabilities in the OpenSSL toolkit. EnGarde Secure
Linux is vulnerable to two of these these three Denial of Service (DoS)
vulnerabilities.
Please refer to the following URL for more details on these issues:
http://www.openssl.org/news/secadv_20040317.txt
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CAN-2004-0079 and CAN-2004-0081 to these issues.
Guardian Digital products affected by this issue include:
EnGarde Secure Community v1.0.1
EnGarde Secure Community 2
EnGarde Secure Professional v1.1
EnGarde Secure Professional v1.2
EnGarde Secure Professional v1.5
It is recommended that all users apply this update as soon as possible.
SOLUTION
- --------
Guardian Digital Secure Network subscribers may automatically update
affected systems by accessing their account from within the Guardian
Digital WebTool.
To modify your GDSN account and contact preferences, please go to:
https://www.guardiandigital.com/account/
Below are MD5 sums for the updated EnGarde Secure Linux 1.0.1 packages:
SRPMS/openssl-0.9.6-1.0.23.src.rpm
MD5 Sum: 3240551fe6a581ca9ada59278cb6b6d6
i386/openssl-0.9.6-1.0.23.i386.rpm
MD5 Sum: 047396beffed7637fc7030743af3937f
i386/openssl-devel-0.9.6-1.0.23.i386.rpm
MD5 Sum: bcfc2554cc58d470c3e666876fe93284
i386/openssl-misc-0.9.6-1.0.23.i386.rpm
MD5 Sum: d88b34e7ce4345168e65bc2d887ba0bb
i686/openssl-0.9.6-1.0.23.i686.rpm
MD5 Sum: 1cf1e62a3c2a97dcca1aabb42502042c
i686/openssl-devel-0.9.6-1.0.23.i686.rpm
MD5 Sum: 9037d0475046f2686cbe7f3cf98029ca
i686/openssl-misc-0.9.6-1.0.23.i686.rpm
MD5 Sum: 15ef352df0d2991ae0fa1c17778ec2f2
REFERENCES
- ----------
Guardian Digital's public key:
http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY
OpenSSL's Official Web Site:
http://www.openssl.org/
Guardian Digital Advisories:
http://infocenter.guardiandigital.com/advisories/
Security Contact: [email protected]
- --------------------------------------------------------------------------
Author: Ryan W. Maple <[email protected]>
Copyright 2004, Guardian Digital, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQFAWGWhHD5cqd57fu0RAujOAJ9JYS8cfBEiewWKcJqcJE7s+3LP1gCggGzS
vsIDyPXFZPOle5ZbyCWFRmM=
=13kU
-----END PGP SIGNATURE-----