(Red Hat Issues Fix for Red Hat Network Satellite Server) OpenSSL ASN.1 Bugs, SSL_get_shared_ciphers() Buffer Overflow, and SSLv2 Client Error Lets Remote Users Denial of Service or Execute Arbitrary Code
SecurityTracker Alert ID: 1020055|
SecurityTracker URL: http://securitytracker.com/id/1020055
CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-4343
(Links to External Site)
Date: May 20 2008
Denial of service via network, Execution of arbitrary code via network, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can execute arbitrary code on the target system. Red Hat Network Satellite Server is affected.|
A remote user can send specially crafted, invalid ASN.1 structures to trigger an infinite loop [CVE-2006-2937]. As a result, the process will consume excessive system memory. Versions prior to 0.9.7 are not affected.
A remote user can use certain types of public keys to cause the target system to take a disproportionate amount of time to process [CVE-2006-2940].
Dr. S. N. Henson developed the ASN.1 test suite for NISCC that uncovered these denial of service vulnerabilities.
A user can send a specially crafted list of ciphers to an application that uses the SSL_get_shared_ciphers() function to trigger a buffer overflow and potentially execute arbitrary code [CVE-2006-3738]. The vendor credits Tavis Ormandy and Will Drewry of the Google Security Team with reporting this vulnerability.
A remote server can cause a connected SSLv2 client to crash [CVE-2006-4343]. The vendor credits Tavis Ormandy and Will Drewry of the Google Security Team with reporting this vulnerability.
A remote user can execute arbitrary code on the target system.|
A remote user can cause denial of service conditions.
Red Hat has released a fix for Red Hat Network Satellite Server (5.0.2) Solaris client, which is affected by this vulnerability.|
The Red Hat advisory is available at:
Boundary error, Exception handling error, State error|
|Underlying OS: Linux (Red Hat Enterprise)|
|Underlying OS Comments: 4|
This archive entry is a follow-up to the message listed below.|
Source Message Contents
Subject: [RHSA-2008:0264-01] Moderate: Red Hat Network Satellite Server|
-----BEGIN PGP SIGNED MESSAGE-----
Red Hat Security Advisory
Synopsis: Moderate: Red Hat Network Satellite Server Solaris client security update
Advisory ID: RHSA-2008:0264-01
Product: Red Hat Network Satellite Server
Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0264.html
Issue date: 2008-05-20
CVE Names: CVE-2005-2096 CVE-2005-1849 CVE-2006-4343
CVE-2006-4339 CVE-2006-3738 CVE-2006-2940
CVE-2006-2937 CVE-2005-2969 CVE-2007-4965
CVE-2007-2052 CVE-2006-4980 CVE-2006-1542
Red Hat Network Satellite Server version 5.0.2 is now available. This
update includes fixes for a number of security issues in Red Hat Network
Satellite Server Solaris client components.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Network Satellite Server 5.0 (RHEL v.4 AS) - noarch
This release corrects several security vulnerabilities in various
components shipped as part of the Red Hat Network Satellite Server Solaris
client. In a typical operating environment, these components are not used
by the Satellite Server in a vulnerable manner. These security updates will
reduce risk should these components be used by other applications.
Two denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,
Multiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,
CVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)
Multiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,
Users of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to
5.0.2, which resolves these issues.
This update is available via Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
5. Bugs fixed (http://bugzilla.redhat.com/):
235093 - CVE-2007-2052 python off-by-one locale.strxfrm() (possible memory disclosure)
295971 - CVE-2007-4965 python imageop module heap corruption
430640 - CVE-2006-1542 python buffer overflow
430641 - CVE-2006-4980 python repr unicode buffer overflow
430649 - CVE-2005-1849 zlib DoS
430651 - CVE-2006-4343 openssl sslv2 client code
430652 - CVE-2006-3738 openssl get_shared_ciphers overflow
430654 - CVE-2006-2940 openssl public key DoS
430655 - CVE-2006-2937 openssl ASN.1 DoS
430659 - CVE-2006-4339 openssl signature forgery
430660 - CVE-2005-2969 openssl mitm downgrade attack
6. Package List:
Red Hat Network Satellite Server 5.0 (RHEL v.4 AS):
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
The Red Hat security contact is <email@example.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2008 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
-----END PGP SIGNATURE-----
RHSA-announce mailing list