The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[ESA-20040317-003] 'openssl' Denial of Service vulnerabilities.


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Wed, 17 Mar 2004 09:49:59 -0500 (EST)
From: EnGarde Secure Linux <[email protected]>
To: [email protected], [email protected]
Subject: [ESA-20040317-003] 'openssl' Denial of Service vulnerabilities.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


+------------------------------------------------------------------------+
| Guardian Digital Security Advisory                      March 17, 2004 |
| http://www.guardiandigital.com                        ESA-20040317-003 |
|                                                                        |
| Packages: openssl, openssl-misc                                        |
| Summary:  Denial of Service vulnerabilities.                           |
+------------------------------------------------------------------------+

  EnGarde Secure Linux is an enterprise class Linux platform engineered
  to enable corporations to quickly and cost-effectively build a complete
  and secure Internet presence while preventing Internet threats.

OVERVIEW
- --------
  Using a commercial TLS protocol testing suite the OpenSSL Project
  discovered three vulnerabilities in the OpenSSL toolkit.  EnGarde Secure
  Linux is vulnerable to two of these these three Denial of Service (DoS)
  vulnerabilities.

  Please refer to the following URL for more details on these issues:

    http://www.openssl.org/news/secadv_20040317.txt

  The Common Vulnerabilities and Exposures project (cve.mitre.org) has
  assigned the names CAN-2004-0079 and CAN-2004-0081 to these issues.

  Guardian Digital products affected by this issue include:

    EnGarde Secure Community v1.0.1
    EnGarde Secure Community 2
    EnGarde Secure Professional v1.1
    EnGarde Secure Professional v1.2
    EnGarde Secure Professional v1.5

  It is recommended that all users apply this update as soon as possible.

SOLUTION
- --------
  Guardian Digital Secure Network subscribers may automatically update
  affected systems by accessing their account from within the Guardian
  Digital WebTool.

  To modify your GDSN account and contact preferences, please go to:

    https://www.guardiandigital.com/account/

  Below are MD5 sums for the updated EnGarde Secure Linux 1.0.1 packages:

    SRPMS/openssl-0.9.6-1.0.23.src.rpm
      MD5 Sum: 3240551fe6a581ca9ada59278cb6b6d6

    i386/openssl-0.9.6-1.0.23.i386.rpm
      MD5 Sum: 047396beffed7637fc7030743af3937f

    i386/openssl-devel-0.9.6-1.0.23.i386.rpm
      MD5 Sum: bcfc2554cc58d470c3e666876fe93284

    i386/openssl-misc-0.9.6-1.0.23.i386.rpm
      MD5 Sum: d88b34e7ce4345168e65bc2d887ba0bb

    i686/openssl-0.9.6-1.0.23.i686.rpm
      MD5 Sum: 1cf1e62a3c2a97dcca1aabb42502042c

    i686/openssl-devel-0.9.6-1.0.23.i686.rpm
      MD5 Sum: 9037d0475046f2686cbe7f3cf98029ca

    i686/openssl-misc-0.9.6-1.0.23.i686.rpm
      MD5 Sum: 15ef352df0d2991ae0fa1c17778ec2f2

REFERENCES
- ----------
  Guardian Digital's public key:
    http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY

  OpenSSL's Official Web Site:
    http://www.openssl.org/

  Guardian Digital Advisories:
    http://infocenter.guardiandigital.com/advisories/

  Security Contact: [email protected]

- --------------------------------------------------------------------------
Author: Ryan W. Maple <[email protected]>
Copyright 2004, Guardian Digital, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFAWGWhHD5cqd57fu0RAujOAJ9JYS8cfBEiewWKcJqcJE7s+3LP1gCggGzS
vsIDyPXFZPOle5ZbyCWFRmM=
=13kU
-----END PGP SIGNATURE-----

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру