VMware ESX 4.0, Patch ESX400-200912402-SG: Updates OpenSSL (1016292)
Summaries and Symptoms
Service console package for OpenSSL is updated to version openssl097a-0.9.7a-9.el5_2.1. The functions inside OpenSSL incorrectly check the result after calling the EVP_VerifyFinal function, which allows a malformed signature to be accepted as valid rather than as an error. This issue affects the signature checks on DSA and ECDSA keys used with SSL/TLS.
The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2008-5077 to this issue.
None beyond the required patch bundles and reboot information listed in the table above.
Patch Download and Installation
See the VMware vCenter Update Manager Administration Guide for instructions on using Update Manager to download and install patches to automatically update ESX 4.0 hosts.
To update ESX 4.0 hosts when not using Update Manager, download the patch zip file from http://support.vmware.com/selfsupport/download/ and install the bulletin using esxupdate from the command line of the host. For more information, see the ESX 4 Patch Management Guide.