The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


UnixWare 7.1.3 UnixWare 7.1.1 : OpenSSL Multiple Vulnerabilities


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
To: [email protected], [email protected],
From: [email protected]
Subject: UnixWare 7.1.3 UnixWare 7.1.1 : OpenSSL Multiple Vulnerabilities
Date: Thu, 20 Jan 2005 17:44:40 -0800
Message-ID: <20050120174440.A10311@caldera.com.>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
X-Virus-Scanned: antivirus-gw at tyumen.ru


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


______________________________________________________________________________

        SCO Security Advisory


Subject:		UnixWare 7.1.3 UnixWare 7.1.1 : OpenSSL Multiple Vulnerabilities
Advisory number: 	SCOSA-2005.7
Issue date: 		2005 January 20
Cross reference:	sr890283 fz529411 erg712602 CAN-2004-0079 CAN-2004-0081 CAN-2004-0112
______________________________________________________________________________


1. Problem Description


        OpenSSL implements the Secure Sockets Layer (SSL) and
        Transport Layer Security (TLS) protocols and includes a
        general purpose cryptographic library. SSL and TLS are
        commonly used to provide authentication, encryption,
        integrity, and non-repudiation services to network 
        applications including HTTP, IMAP, POP3, SMTP, and LDAP. 

        The U.K. National Infrastructure Security Co-ordination 
        Centre (NISCC) and the OpenSSL Project have reported several
        vulnerabilities in the OpenSSL SSL/TLS library (libssl). 
        Any application or system that uses this library may be 
        affected. 

        CERT Vulnerability Note VU#288574 
        OpenSSL contains null-pointer assignment in do_change_cipher_spec()
        function 

        The Common Vulnerabilities and Exposures project (cve.mitre.org) 
        has assigned the name CAN-2004-0079 to this issue. 

        CERT Vulnerability Note VU#465542 
        OpenSSL does not properly handle unknown message types 

        The Common Vulnerabilities and Exposures project (cve.mitre.org) 
        has assigned the name CAN-2004-0081 to this issue.

        CERT Vulnerability Note VU#484726
        OpenSSL does not adequately validate length of Kerberos ticket 
        during SSL/TLS handshake.  

        The Common Vulnerabilities and Exposures project (cve.mitre.org)
        has assigned the name CAN-2004-0112 to this issue.


2. Vulnerable Supported Versions


        System				Binaries
        ----------------------------------------------------------------------
        UnixWare 7.1.4 			Not vulnerable
        UnixWare 7.1.3 			Distribution
        UnixWare 7.1.1 			Distribution


3. Solution


        The proper solution is to install the latest packages.


4. UnixWare 7.1.3


        4.1 Location of Fixed Binaries


        ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.7

        4.2 Verification


        MD5 (openssl.pkg) = d2ba4c1dee05dad681b39bfea4d4d7f9
        MD5 (openssld.pkg) = 6a737b8d0265e8194f55f39518380bae

        md5 is available for download from
        ftp://ftp.sco.com/pub/security/tools


        4.3 Installing Fixed Binaries


        Upgrade the affected binaries with the following sequence:

        Download openssl.pkg to the /var/spool/pkg directory

        # pkgadd -d /var/spool/pkg/openssl.pkg


5. UnixWare 7.1.1


        5.1 Location of Fixed Binaries


        ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.7

        The fixes are also available in SCO UnixWare Release 7.1.1
        Maintenance Pack 5 or later.  See
        ftp://ftp.sco.com/pub/unixware7/uw711pk/uw711mp5.txt

        5.2 Verification


        MD5 (openssl.pkg) = d2ba4c1dee05dad681b39bfea4d4d7f9
        MD5 (openssld.pkg) = 6a737b8d0265e8194f55f39518380bae

        md5 is available for download from
        ftp://ftp.sco.com/pub/security/tools


        5.3 Installing Fixed Binaries


        Upgrade the affected binaries with the following sequence:

        Download openssld.pkg to the /var/spool/pkg directory

        # pkgadd -d /var/spool/pkg/openssld.pkg


6. References


        Specific references for this advisory:
        http://www.us-cert.gov/cas/techalerts/TA04-078A.html 
        http://www.kb.cert.org/vuls/id/288574 
        http://www.kb.cert.org/vuls/id/484726 
        http://www.kb.cert.org/vuls/id/465542 
        http://www.openssl.org/news/secadv_20040317.txt 
        http://www.uniras.gov.uk/vuls/2004/224012/index.htm 
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079 
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112 
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0081

        SCO security resources:
        http://www.sco.com/support/security/index.html

        SCO security advisories via email
        http://www.sco.com/support/forums/security.html

        This security fix closes SCO incidents sr890283 fz529411
        erg712602.


7. Disclaimer


        SCO is not responsible for the misuse of any of the information
        we provide on this website and/or through our security
        advisories. Our advisories are a service to our customers
        intended to promote secure installation and use of SCO
        products.


8. Acknowledgments


        SCO would like to thank The U.K. National Infrastructure
        Security Co-ordination Centre (NISCC) and the OpenSSL team.


______________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (SCO/UNIX_SVR5)

iD8DBQFB8E4YaqoBO7ipriERAiQxAKChI85vzJI+OSVxR3MCd+pwjISclACbBbNu
o5meMgN1rcRaBZ7jb7K6sXA=
=11K1
-----END PGP SIGNATURE-----


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру