Korean
<< Back
VID 22625
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description According to its banner, the remote web server is running a version of OpenSSL 1.0.1 prior to 1.0.1h. The OpenSSL library is, therefore, reportedly affected by the following vulnerabilities :

- An error exists in the function 'ssl3_read_bytes' that could allow data to be injected into other sessions or allow denial of service attacks. (CVE-2010-5298)
- A buffer overflow error exists related to invalid DTLS fragment handling that could lead to execution of arbitrary code. (CVE-2014-0195)
- An error exists in the function 'do_ssl3_write' that could allow a null pointer to be dereferenced leading to denial of service attacks. (CVE-2014-0198)
- An error exists related to DTLS handshake handling that could lead to denial of service attacks. (CVE-2014-0221)
- An unspecified error exists that could allow an attacker to cause usage of weak keying material leading to simplified man-in-the-middle attacks. (CVE-2014-0224)
- An unspecified error exists related to anonymous ECDH ciphersuites that could allow denial of service attacks. (CVE-2014-3470)

* References:
http://www.openssl.org/news/vulnerabilities.html#CVE-2010-5298
http://www.openssl.org/news/vulnerabilities.html#CVE-2014-0198
http://www.openssl.org/news/vulnerabilities.html#CVE-2014-0221
http://www.openssl.org/news/vulnerabilities.html#CVE-2014-0224
http://www.openssl.org/news/vulnerabilities.html#CVE-2014-3470
http://www.openssl.org/news/secadv_20140605.txt

* Platforms Affected:
OpenSSL 1.0.1 prior to 1.0.1h
Linux Any version
Unix Any version
Microsoft Windows Any version
Recommendation Upgrade to the latest version of OpenSSL (1.0.1h or later), available from the OpenSSL Web site at http://www.openssl.org/
Related URL CVE-2010-5298,CVE-2014-0195,CVE-2014-0198,CVE-2014-0221,CVE-2014-0224,CVE-2014-3470 (CVE)
Related URL 66801,67193,67898,67899,67900,67901 (SecurityFocus)
Related URL (ISS)