Debian Security Advisory DSA 1888-1 (openssl, openssl097)

Published: 2009-09-21 21:13:00
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:


Technical Details:
Certificates with MD2 hash signatures are no longer accepted by OpenSSL, since they're no longer considered cryptographically secure. For the stable distribution (lenny), this problem has been fixed in version 0.9.8g-15+lenny5. For the old stable distribution (etch), this problem has been fixed in version 0.9.8c-4etch9 for openssl and version 0.9.7k-3.1etch5 for openssl097. The OpenSSL 0.9.8 update for oldstable (etch) also provides updated Linux Distribution Packages for multiple denial of service vulnerabilities in the Datagram Transport Layer Security implementation. These fixes were already provided for Debian stable (Lenny) in a previous point update. The OpenSSL 0.9.7 Linux Distribution Package from oldstable (Etch) is not affected. (CVE-2009-1377, CVE-2009-1378, CVE-2009-1379, CVE-2009-1386 and CVE-2009-1387) For the unstable distribution (sid), this problem has been fixed in version 0.9.8k-5. We recommend that you upgrade your openssl Linux Distribution Packages.

The remote host is missing an update to openssl, openssl097 announced via advisory DSA 1888-1.

Detection Type:
Linux Distribution Package

Solution Type:
Vendor Patch

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

CVSS Score

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.