EnGarde Secure Linux alert: 'openssl' Denial of Service vulnerabilities.

Posted by dave on Mar 17, 2004 6:02 AM EDT
Mailing list
Mail this story
Print this story

Using a commercial TLS protocol testing suite the OpenSSL Project discovered three vulnerabilities in the OpenSSL toolkit. EnGarde Secure Linux is vulnerable to two of these these three Denial of Service (DoS) vulnerabilities.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

+------------------------------------------------------------------------+ | Guardian Digital Security Advisory March 17, 2004 | | http://www.guardiandigital.com ESA-20040317-003 | | | | Packages: openssl, openssl-misc | | Summary: Denial of Service vulnerabilities. | +------------------------------------------------------------------------+

EnGarde Secure Linux is an enterprise class Linux platform engineered to enable corporations to quickly and cost-effectively build a complete and secure Internet presence while preventing Internet threats.

OVERVIEW - -------- Using a commercial TLS protocol testing suite the OpenSSL Project discovered three vulnerabilities in the OpenSSL toolkit. EnGarde Secure Linux is vulnerable to two of these these three Denial of Service (DoS) vulnerabilities.

Please refer to the following URL for more details on these issues:

http://www.openssl.org/news/secadv_20040317.txt

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2004-0079 and CAN-2004-0081 to these issues.

Guardian Digital products affected by this issue include:

EnGarde Secure Community v1.0.1 EnGarde Secure Community 2 EnGarde Secure Professional v1.1 EnGarde Secure Professional v1.2 EnGarde Secure Professional v1.5

It is recommended that all users apply this update as soon as possible.

SOLUTION - -------- Guardian Digital Secure Network subscribers may automatically update affected systems by accessing their account from within the Guardian Digital WebTool.

To modify your GDSN account and contact preferences, please go to:

https://www.guardiandigital.com/account/

Below are MD5 sums for the updated EnGarde Secure Linux 1.0.1 packages:

SRPMS/openssl-0.9.6-1.0.23.src.rpm MD5 Sum: 3240551fe6a581ca9ada59278cb6b6d6

i386/openssl-0.9.6-1.0.23.i386.rpm MD5 Sum: 047396beffed7637fc7030743af3937f

i386/openssl-devel-0.9.6-1.0.23.i386.rpm MD5 Sum: bcfc2554cc58d470c3e666876fe93284

i386/openssl-misc-0.9.6-1.0.23.i386.rpm MD5 Sum: d88b34e7ce4345168e65bc2d887ba0bb

i686/openssl-0.9.6-1.0.23.i686.rpm MD5 Sum: 1cf1e62a3c2a97dcca1aabb42502042c

i686/openssl-devel-0.9.6-1.0.23.i686.rpm MD5 Sum: 9037d0475046f2686cbe7f3cf98029ca

i686/openssl-misc-0.9.6-1.0.23.i686.rpm MD5 Sum: 15ef352df0d2991ae0fa1c17778ec2f2

REFERENCES - ---------- Guardian Digital's public key: http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY

OpenSSL's Official Web Site: http://www.openssl.org/

Guardian Digital Advisories: http://infocenter.guardiandigital.com/advisories/

Security Contact: [e-mail:security@guardiandigital.com]

- -------------------------------------------------------------------------- Author: Ryan W. Maple Copyright 2004, Guardian Digital, Inc.

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFAWGWhHD5cqd57fu0RAujOAJ9JYS8cfBEiewWKcJqcJE7s+3LP1gCggGzS vsIDyPXFZPOle5ZbyCWFRmM= =13kU -----END PGP SIGNATURE----- ------------------------------------------------------------------------ To unsubscribe email [e-mail:engarde-security-request@engardelinux.org] with "unsubscribe" in the subject of the message.

Copyright(c) 2003 Guardian Digital, Inc. GuardianDigital.com ------------------------------------------------------------------------

[PARSEASHTML]

  Nav
» Read more about: Story Type: Security; Groups: EnGarde

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.