Korean
<< Back
VID 14201
Severity 30
Port 22
Protocol TCP
Class LSC
Detailed Description The remote system does not apply RHSA-2015-1072 which is OpenSSL security update. A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic.

Note: This check solely relied on the OpenSSL RPM version of the remote system to assess this vulnerability, so this might be a false positive.

* References:
https://rhn.redhat.com/errata/RHSA-2015-1072.html
https://access.redhat.com/articles/1456263

* Platforms Affected:
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server (v. 7)
Recommendation Update the affected packages.
Launch the graphical update tool through
Applications -> System Tools -> Software Update

For a command line interface, use the following command to update the operating system:
# yum update

To install openssl package, use the following command:
# yum install openssl
Related URL CVE-2015-4000 (CVE)
Related URL 74733 (SecurityFocus)
Related URL (ISS)