VID |
22617 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the remote web server is running a version of OpenSSL 1.0.1 prior to 1.0.1g and vulnerable to Heartbleed bug and side-channel attack. The OpenSSL library is, therefore, reportedly affected by the following vulnerabilities :
- An error exists related to the implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) that could allow nonce disclosure via the 'FLUSH+RELOAD' cache side-channel attack. (CVE-2014-0076) - An out-of-bounds read error, known as the 'Heartbleed Bug', exists related to handling TLS heartbeat extensions that could allow an attacker to obtain sensitive information such as primary key material, secondary key material and other protected content. (CVE-2014-0160)
* References: http://heartbleed.com/ http://eprint.iacr.org/2014/140 http://www.openssl.org/news/vulnerabilities.html#2014-0076 http://www.openssl.org/news/vulnerabilities.html#2014-0160 http://www.mail-archive.com/openssl-announce@openssl.org/msg00131.html
* Platforms Affected: OpenSSL 1.0.1 prior to 1.0.1g Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (1.0.1g or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2014-0076,CVE-2014-0160 (CVE) |
Related URL |
66363,66690 (SecurityFocus) |
Related URL |
(ISS) |
|