Korean
<< Back
VID 22676
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description According to its banner, the remote web server uses a version of OpenSSL which is 1.0.2b or 1.0.2c. Such versions may be affected by a certificate validation bypass vulnerability, due to a flaw in the X509_verify_cert() function in file x509_vfy.c, which occurs when locating alternate certificate chains whenever the first attempt to build such a chain fails. A remote attacker can exploit this, by using a valid leaf certificate as a certificate authority (CA), to issue invalid certificates that will bypass authentication.

* References:
http://openssl.org/news/secadv_20150709.txt

* Platforms Affected:
OpenSSL 1.0.2b or 1.0.2c
Recommendation Upgrade to the latest version of OpenSSL (1.0.2d or later), available from the OpenSSL Web site at http://www.openssl.org/
Related URL CVE-2015-1793 (CVE)
Related URL 75652 (SecurityFocus)
Related URL (ISS)