Executive Summary
Summary | |
---|---|
Title | New OpenSSL packages fix cryptographic weakness |
Informations | |||
---|---|---|---|
Name | DSA-888 | First vendor Publication | 2005-11-07 |
Vendor | Debian | Last vendor Modification | 2005-11-07 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Yutaka Oiwa discovered a vulnerability in the Open Secure Socket Layer (OpenSSL) library that can allow an attacker to perform active protocol-version rollback attacks that could lead to the use of the weaker SSL 2.0 protocol even though both ends support SSL 3.0 or TLS 1.0. The following matrix explains which version in which distribution has this problem corrected. oldstable (woody) stable (sarge) unstable (sid) openssl 0.9.6c-2.woody.8 0.9.7e-3sarge1 0.9.8-3 openssl 094 0.9.4-6.woody.4 n/a n/a openssl 095 0.9.5a-6.woody.6 n/a n/a openssl 096 n/a 0.9.6m-1sarge1 n/a openssl 097 n/a n/a 0.9.7g-5 We recommend that you upgrade your libssl packages. |
Original Source
Url : http://www.debian.org/security/2005/dsa-888 |
Alert History
Date | Informations |
---|---|
2016-04-26 17:42:20 |
|
2014-02-17 11:34:37 |
|
2013-05-11 12:19:16 |
|