VID |
210217 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of OpenSSL installed on the remote host is prior to 1.0.2ze. It is, therefore, affected by a vulnerability as referenced in the 1.0.2ze advisory.
- The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. * References: https://cve.org/CVERecord?id=CVE-2022-1292 https://www.openssl.org/news/secadv/20220503.txt
* Platforms Affected: OpenSSL 1.0.x before 1.0.2ze Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (1.0.2ze or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2022-1292 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|