VID |
22540 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the remote web server uses a version of OpenSSL older than 0.9.8h. Such versions may be affected by the following vulnerabilities :
- A double-free error exists related to the handling of server name extension data and specially crafted TLS 1.0 'Client Hello' packets. This can cause application crashes. Note that successful exploitation requires that OpenSSL is compiled with the TLS server name extensions. (CVE-2008-0891)
- A NULL pointer dereference error exists related to anonymous Diffie-Hellman key exchange and TLS handshakes. This can be exploited by omitting the 'Server Key exchange message' from the handshake and can cause application crashes. (CVE-2008-1672)
- On 32-bit builds, an information disclosure vulnerability exists during certain calculations for NIST elliptic curves P-256 or P-384. This error can allow an attacker to recover the private key of the TLS server.
* References: http://www.openwall.com/lists/oss-security/2011/12/01/6 http://www.openssl.org/news/secadv_20080528.txt
* Platforms Affected: OpenSSL 0.9.8 before 0.9.8h |
Recommendation |
Upgrade to the latest version of OpenSSL (0.9.8h or later) |
Related URL |
CVE-2008-0891,CVE-2008-1672,CVE-2011-4354 (CVE) |
Related URL |
29405,50882 (SecurityFocus) |
Related URL |
(ISS) |
|