The version of OpenSSL used by VDI-in-a-Box’s vdiManager virtual appliance has been identified as vulnerable to a number of security vulnerabilities, including CVE-2014-0160 and CVE-2014-0224. This article describes how to verify the version of OpenSSL contained within the appliance and also verify whether this is up to date.
More information on the Citrix response to these vulnerabilities can be found in the following articles:
Log on as user kvm directly to vdiManager’s console from hypervisor, or use any SSH program like PuTTY to log on to vdiManager. The default password is kaviza123.
Type the following rpm command:
kvm@vdimgr:~$ rpm -q --changelog openssl |more
- fix CVE-2010-5298 - possible use of memory after free - fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment - fix CVE-2014-0198 - possible NULL pointer dereference - fix CVE-2014-0221 - DoS from invalid DTLS handshake packet - fix CVE-2014-0224 - SSL/TLS MITM vulnerability - fix CVE-2014-3470 - client-side DoS when using anonymous ECDH - fix CVE-2014-0160 - information disclosure in TLS heartbeat extension
vdiManager is correctly patched if 7 entries of OpenSSL related fixes are listed.