Ubuntu USN-792-1 (openssl)

Summary
The remote host is missing an update to openssl announced via advisory USN-792-1.
Solution
The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: libssl0.9.8 0.9.8a-7ubuntu0.9 Ubuntu 8.04 LTS: libssl0.9.8 0.9.8g-4ubuntu3.7 Ubuntu 8.10: libssl0.9.8 0.9.8g-10.1ubuntu2.4 Ubuntu 9.04: libssl0.9.8 0.9.8g-15ubuntu3.2 After a standard system upgrade you need to reboot your computer to effect the necessary changes. https://secure1.securityspace.com/smysecure/catid.html?in=USN-792-1
Insight
It was discovered that OpenSSL did not limit the number of DTLS records it would buffer when they arrived with a future epoch. A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests. (CVE-2009-1377) It was discovered that OpenSSL did not properly free memory when processing DTLS fragments. A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests. (CVE-2009-1378) It was discovered that OpenSSL did not properly handle certain server certificates when processing DTLS packets. A remote DTLS server could cause a denial of service by sending a message containing a specially crafted server certificate. (CVE-2009-1379) It was discovered that OpenSSL did not properly handle a DTLS ChangeCipherSpec packet when it occured before ClientHello. A remote attacker could cause a denial of service by sending a specially crafted request. (CVE-2009-1386) It was discovered that OpenSSL did not properly handle out of sequence DTLS handshake messages. A remote attacker could cause a denial of service by sending a specially crafted request. (CVE-2009-1387)