Korean
<< Back
VID 22609
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description According to its banner, the remote web server is running a version of OpenSSL 1.0.1 prior to 1.0.1f. The OpenSSL library is, therefore, reportedly affected by the following vulnerabilities :

- An error exists in the 'ssl3_take_mac' function in the file 'ssl/s3_both.c' related to handling TLS handshake traffic that could lead to denial of service attacks.(CVE-2013-4353)

- An error exists in the 'ssl_get_algorithm2' function in the file 'ssl/s3_lib.c' related to handling TLS 1.2 traffic that could lead to denial of service attacks. (CVE-2013-6449)

- An error exists related to man-in-the-middle attackers and handling DTLS processes that could lead to various security bypasses. (CVE-2013-6450)

* References:
http://www.mail-archive.com/openssl-announce@openssl.org/msg00128.html

* Platforms Affected:
OpenSSL 1.0.1 prior to 1.0.1f
Linux Any version
Unix Any version
Microsoft Windows Any version
Recommendation Upgrade to the latest version of OpenSSL (1.0.1f or later), available from the OpenSSL Web site at http://www.openssl.org/
Related URL CVE-2013-4353,CVE-2013-6449,CVE-2013-6450 (CVE)
Related URL 64530,64618,64691 (SecurityFocus)
Related URL (ISS)