VID |
22626 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the remote web server is running a version of OpenSSL 0.9.8 prior to 0.9.8za. The OpenSSL library is, therefore, reportedly affected by the following vulnerabilities :
- An error exists related to the implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) that could allow nonce disclosure via the 'FLUSH+RELOAD' cache side-channel attack. (CVE-2014-0076) - A buffer overflow error exists related to invalid DTLS fragment handling that could lead to execution of arbitrary code. Note this issue only affects OpenSSL when used as a DTLS client or server. (CVE-2014-0195) - An error exists related to DTLS handshake handling that could lead to denial of service attacks. (CVE-2014-0221) - An unspecified error exists that could allow an attacker to cause usage of weak keying material leading to simplified man-in-the-middle attacks. (CVE-2014-0224) - An unspecified error exists related to anonymous ECDH ciphersuites that could allow denial of service attacks. (CVE-2014-3470)
* References: http://www.openssl.org/news/vulnerabilities.html#2014-0076 http://www.openssl.org/news/vulnerabilities.html#CVE-2014-0221 http://www.openssl.org/news/vulnerabilities.html#CVE-2014-0224 http://www.openssl.org/news/vulnerabilities.html#CVE-2014-3470 http://www.openssl.org/news/secadv_20140605.txt
* Platforms Affected: OpenSSL 0.9.8 prior to 0.9.8za Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (0.9.8za or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2014-0076,CVE-2014-0195,CVE-2014-0221,CVE-2014-0224,CVE-2014-3470 (CVE) |
Related URL |
66363,67898,67899,67900,67901 (SecurityFocus) |
Related URL |
(ISS) |
|