VID |
22608 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the remote web server is running a version of OpenSSL 1.0.0 prior to 1.0.0l. The OpenSSL library is, therefore, reportedly affected by a security bypass vulnerability related to handling DTLS processes.
* References: http://www.mail-archive.com/openssl-announce@openssl.org/msg00129.html http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2d64b51d20375dbf52ca9cd45b5fea9772605935
* Platforms Affected: OpenSSL 1.0.0 prior to 1.0.0l Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (1.0.0l or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2013-6450 (CVE) |
Related URL |
64618 (SecurityFocus) |
Related URL |
(ISS) |
|