| VID |
14201 |
| Severity |
30 |
| Port |
22 |
| Protocol |
TCP |
| Class |
LSC |
| Detailed Description |
The remote system does not apply RHSA-2015-1072 which is OpenSSL security update. A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them do decrypt all traffic.
Note: This check solely relied on the OpenSSL RPM version of the remote system to assess this vulnerability, so this might be a false positive.
* References: https://rhn.redhat.com/errata/RHSA-2015-1072.html https://access.redhat.com/articles/1456263
* Platforms Affected: Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server (v. 7) |
| Recommendation |
Update the affected packages. Launch the graphical update tool through Applications -> System Tools -> Software Update
For a command line interface, use the following command to update the operating system: # yum update
To install openssl package, use the following command: # yum install openssl |
| Related URL |
CVE-2015-4000 (CVE) |
| Related URL |
74733 (SecurityFocus) |
| Related URL |
(ISS) |
|