VID |
22634 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the remote web server uses a version of OpenSSL 0.9.8 prior to 0.9.8zb. The OpenSSL library is, therefore, affected by the following vulnerabilities :
- A memory double-free error exists related to handling DTLS packets that allows denial of service attacks. (CVE-2014-3505)
- An unspecified error exists related to handling DTLS handshake messages that allows denial of service attacks due to large amounts of memory being consumed. (CVE-2014-3506)
- A memory leak error exists related to handling specially crafted DTLS packets that allows denial of service attacks. (CVE-2014-3507)
- An error exists related to 'OBJ_obj2txt' and the pretty printing 'X509_name_*' functions which leak stack data, resulting in an information disclosure. (CVE-2014-3508)
- A null pointer dereference error exists related to handling anonymous ECDH cipher suites and crafted handshake messages that allow denial of service attacks against clients. (CVE-2014-3510)
* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: https://www.openssl.org/news/openssl-0.9.8-notes.html https://www.openssl.org/news/secadv_20140806.txt https://www.openssl.org/news/vulnerabilities.html
* Platforms Affected: OpenSSL 0.9.8 prior to 0.9.8zb Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (0.9.8zb or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2014-3505,CVE-2014-3506,CVE-2014-3507,CVE-2014-3508,CVE-2014-3509,CVE-2014-3510 (CVE) |
Related URL |
69075,69076,69078,69081,69082,69084 (SecurityFocus) |
Related URL |
(ISS) |
|