Bug 206940

Summary: CVE-2006-3738 OpenSSL issues (CVE-2006-4343)
Product: Red Hat Enterprise Linux 4 Reporter: Mark J. Cox <mjc>
Component: opensslAssignee: Tomas Mraz <tmraz>
Status: CLOSED ERRATA QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: medium    
Version: 4.0CC: security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: reported=20060828,public=20060928,source=vendorsec
Fixed In Version: RHSA-2006-0695 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2006-09-29 00:05:29 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 209116, 430652    
Attachments:
Description Flags
Proposed patch CVE-2006-4343
none
Proposed patch CVE-2006-3738 none

Description Mark J. Cox 2006-09-18 10:51:31 UTC
Tavis Ormandy and Will Drewry of the Google Security Team discovered a buffer 
overflow in SSL_get_shared_ciphers utility function, used by some 
applications such as exim and mysql.  An attacker could send a list of 
ciphers that would overrun a buffer CVE-2006-3738

Tavis Ormandy and Will Drewry of the Google Security Team discovered a 
possible DoS in the sslv2 client code.  Where a client application uses 
OpenSSL to make a SSLv2 connection to a malicious server that server 
could cause the client to crash.  CVE-2006-4343

EMBARGO until 20060928

Comment 1 Mark J. Cox 2006-09-18 10:51:32 UTC
Created attachment 136527 [details]
Proposed patch CVE-2006-4343

Comment 2 Mark J. Cox 2006-09-18 10:53:44 UTC
Created attachment 136528 [details]
Proposed patch CVE-2006-3738

Comment 5 Mark J. Cox 2006-09-28 13:26:44 UTC
removing embargo, public at http://www.openssl.org/news/secadv_20060928.txt

Comment 6 Red Hat Bugzilla 2006-09-29 00:05:31 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2006-0695.html