| VID |
22676 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
According to its banner, the remote web server uses a version of OpenSSL which is 1.0.2b or 1.0.2c. Such versions may be affected by a certificate validation bypass vulnerability, due to a flaw in the X509_verify_cert() function in file x509_vfy.c, which occurs when locating alternate certificate chains whenever the first attempt to build such a chain fails. A remote attacker can exploit this, by using a valid leaf certificate as a certificate authority (CA), to issue invalid certificates that will bypass authentication.
* References: http://openssl.org/news/secadv_20150709.txt
* Platforms Affected: OpenSSL 1.0.2b or 1.0.2c |
| Recommendation |
Upgrade to the latest version of OpenSSL (1.0.2d or later), available from the OpenSSL Web site at http://www.openssl.org/ |
| Related URL |
CVE-2015-1793 (CVE) |
| Related URL |
75652 (SecurityFocus) |
| Related URL |
(ISS) |
|