Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Red Hat Network Satellite Server Vendors:   Red Hat
(Red Hat Issues Fix for Red Hat Network Satellite Server) OpenSSL SSL_OP_MSIE_SSLV2_RSA_PADDING Option May Let Remote Users Rollback the Protocol Version
SecurityTracker Alert ID:  1020053
SecurityTracker URL:
CVE Reference:   CVE-2005-2969   (Links to External Site)
Date:  May 20 2008
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.0
Description:   A vulnerability was reported in OpenSSL. A remote user may be able to cause a target client and server to rollback to a weaker cryptographic protocol in certain cases. Red Hat Network Satellite Server is affected.

The SSL_OP_MSIE_SSLV2_RSA_PADDING option (or SSL_OP_ALL option) disables a verification step in the SSL 2.0 server that would otherwise prevent active protocol-version rollback attacks.

A remote user can conduct a "man in the middle" attack to force a client and a server to negotiate the SSL 2.0 protocol instead of SSL 3.0 or TLS 1.0. The SSL 2.0 protocol is a cryptographically weak protocol.

Applications that use the OpenSSL SSL/TLS server implementation may be affected.

Applications that do not use SSL_OP_MSIE_SSLV2_RSA_PADDING and SSL_OP_ALL are not affected. Applications that disable the use of SSL 2.0 are also not affected.

The vendor credits Yutaka Oiwa of the Research Center for Information Security, National Institute of Advanced Industrial Science and Technology (AIST), Japan, with reporting this vulnerability.

Impact:   A remote user with the ability to conduct a man-in-the-middle attack can cause a client and server to use the weaker SSL 2.0 protocol.
Solution:   Red Hat has released a fix for Red Hat Network Satellite Server (5.0.2) Solaris client, which is affected by this vulnerability.

The Red Hat advisory is available at:

Cause:   Authentication error, State error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  4

Message History:   This archive entry is a follow-up to the message listed below.
Oct 11 2005 OpenSSL SSL_OP_MSIE_SSLV2_RSA_PADDING Option May Let Remote Users Rollback the Protocol Version

 Source Message Contents

Subject:  [RHSA-2008:0264-01] Moderate: Red Hat Network Satellite Server

Hash: SHA1

                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Network Satellite Server Solaris client security update
Advisory ID:       RHSA-2008:0264-01
Product:           Red Hat Network Satellite Server
Advisory URL:
Issue date:        2008-05-20
CVE Names:         CVE-2005-2096 CVE-2005-1849 CVE-2006-4343 
                   CVE-2006-4339 CVE-2006-3738 CVE-2006-2940 
                   CVE-2006-2937 CVE-2005-2969 CVE-2007-4965 
                   CVE-2007-2052 CVE-2006-4980 CVE-2006-1542 

1. Summary:

Red Hat Network Satellite Server version 5.0.2 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Network Satellite Server 5.0 (RHEL v.4 AS) - noarch

3. Description:

This release corrects several security vulnerabilities in various
components shipped as part of the Red Hat Network Satellite Server Solaris
client. In a typical operating environment, these components are not used
by the Satellite Server in a vulnerable manner. These security updates will
reduce risk should these components be used by other applications.

Two denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,

Multiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,
CVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)

Multiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,
CVE-2006-4980, CVE-2006-1542)

Users of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to
5.0.2, which resolves these issues.

4. Solution:

This update is available via Red Hat Network.  Details on how to use the
Red Hat Network to apply this update are available at

5. Bugs fixed (

235093 - CVE-2007-2052 python off-by-one locale.strxfrm() (possible memory disclosure)
295971 - CVE-2007-4965 python imageop module heap corruption
430640 - CVE-2006-1542 python buffer overflow
430641 - CVE-2006-4980 python repr unicode buffer overflow
430649 - CVE-2005-1849 zlib DoS
430651 - CVE-2006-4343 openssl sslv2 client code
430652 - CVE-2006-3738 openssl get_shared_ciphers overflow
430654 - CVE-2006-2940 openssl public key DoS
430655 - CVE-2006-2937 openssl ASN.1 DoS
430659 - CVE-2006-4339 openssl signature forgery
430660 - CVE-2005-2969 openssl mitm downgrade attack

6. Package List:

Red Hat Network Satellite Server 5.0 (RHEL v.4 AS):


These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from

7. References:

8. Contact:

The Red Hat security contact is <>.  More contact
details at

Copyright 2008 Red Hat, Inc.
Version: GnuPG v1.4.4 (GNU/Linux)


RHSA-announce mailing list


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC