(Red Hat Issues Fix for Red Hat Network Satellite Server) OpenSSL SSL_OP_MSIE_SSLV2_RSA_PADDING Option May Let Remote Users Rollback the Protocol Version
SecurityTracker Alert ID: 1020053|
SecurityTracker URL: http://securitytracker.com/id/1020053
(Links to External Site)
Date: May 20 2008
Disclosure of authentication information, Disclosure of system information, Disclosure of user information|
Fix Available: Yes Vendor Confirmed: Yes |
A vulnerability was reported in OpenSSL. A remote user may be able to cause a target client and server to rollback to a weaker cryptographic protocol in certain cases. Red Hat Network Satellite Server is affected.|
The SSL_OP_MSIE_SSLV2_RSA_PADDING option (or SSL_OP_ALL option) disables a verification step in the SSL 2.0 server that would otherwise prevent active protocol-version rollback attacks.
A remote user can conduct a "man in the middle" attack to force a client and a server to negotiate the SSL 2.0 protocol instead of SSL 3.0 or TLS 1.0. The SSL 2.0 protocol is a cryptographically weak protocol.
Applications that use the OpenSSL SSL/TLS server implementation may be affected.
Applications that do not use SSL_OP_MSIE_SSLV2_RSA_PADDING and SSL_OP_ALL are not affected. Applications that disable the use of SSL 2.0 are also not affected.
The vendor credits Yutaka Oiwa of the Research Center for Information Security, National Institute of Advanced Industrial Science and Technology (AIST), Japan, with reporting this vulnerability.
A remote user with the ability to conduct a man-in-the-middle attack can cause a client and server to use the weaker SSL 2.0 protocol.|
Red Hat has released a fix for Red Hat Network Satellite Server (5.0.2) Solaris client, which is affected by this vulnerability.|
The Red Hat advisory is available at:
Authentication error, State error|
|Underlying OS: Linux (Red Hat Enterprise)|
|Underlying OS Comments: 4|
This archive entry is a follow-up to the message listed below.|
Source Message Contents
Subject: [RHSA-2008:0264-01] Moderate: Red Hat Network Satellite Server|
-----BEGIN PGP SIGNED MESSAGE-----
Red Hat Security Advisory
Synopsis: Moderate: Red Hat Network Satellite Server Solaris client security update
Advisory ID: RHSA-2008:0264-01
Product: Red Hat Network Satellite Server
Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0264.html
Issue date: 2008-05-20
CVE Names: CVE-2005-2096 CVE-2005-1849 CVE-2006-4343
CVE-2006-4339 CVE-2006-3738 CVE-2006-2940
CVE-2006-2937 CVE-2005-2969 CVE-2007-4965
CVE-2007-2052 CVE-2006-4980 CVE-2006-1542
Red Hat Network Satellite Server version 5.0.2 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Network Satellite Server 5.0 (RHEL v.4 AS) - noarch
This release corrects several security vulnerabilities in various
components shipped as part of the Red Hat Network Satellite Server Solaris
client. In a typical operating environment, these components are not used
by the Satellite Server in a vulnerable manner. These security updates will
reduce risk should these components be used by other applications.
Two denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,
Multiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,
CVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)
Multiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,
Users of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to
5.0.2, which resolves these issues.
This update is available via Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
5. Bugs fixed (http://bugzilla.redhat.com/):
235093 - CVE-2007-2052 python off-by-one locale.strxfrm() (possible memory disclosure)
295971 - CVE-2007-4965 python imageop module heap corruption
430640 - CVE-2006-1542 python buffer overflow
430641 - CVE-2006-4980 python repr unicode buffer overflow
430649 - CVE-2005-1849 zlib DoS
430651 - CVE-2006-4343 openssl sslv2 client code
430652 - CVE-2006-3738 openssl get_shared_ciphers overflow
430654 - CVE-2006-2940 openssl public key DoS
430655 - CVE-2006-2937 openssl ASN.1 DoS
430659 - CVE-2006-4339 openssl signature forgery
430660 - CVE-2005-2969 openssl mitm downgrade attack
6. Package List:
Red Hat Network Satellite Server 5.0 (RHEL v.4 AS):
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
The Red Hat security contact is <firstname.lastname@example.org>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2008 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
-----END PGP SIGNATURE-----
RHSA-announce mailing list