VID |
22609 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the remote web server is running a version of OpenSSL 1.0.1 prior to 1.0.1f. The OpenSSL library is, therefore, reportedly affected by the following vulnerabilities :
- An error exists in the 'ssl3_take_mac' function in the file 'ssl/s3_both.c' related to handling TLS handshake traffic that could lead to denial of service attacks.(CVE-2013-4353)
- An error exists in the 'ssl_get_algorithm2' function in the file 'ssl/s3_lib.c' related to handling TLS 1.2 traffic that could lead to denial of service attacks. (CVE-2013-6449)
- An error exists related to man-in-the-middle attackers and handling DTLS processes that could lead to various security bypasses. (CVE-2013-6450)
* References: http://www.mail-archive.com/openssl-announce@openssl.org/msg00128.html
* Platforms Affected: OpenSSL 1.0.1 prior to 1.0.1f Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (1.0.1f or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2013-4353,CVE-2013-6449,CVE-2013-6450 (CVE) |
Related URL |
64530,64618,64691 (SecurityFocus) |
Related URL |
(ISS) |
|