Korean
<< Back
VID 22677
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description According to its banner, the remote web server uses a version of OpenSSL which is 1.0.1n or 1.0.1o. Such versions may be affected by a certificate validation bypass vulnerability, due to a flaw in the X509_verify_cert() function in file x509_vfy.c, which occurs when locating alternate certificate chains whenever the first attempt to build such a chain fails. A remote attacker can exploit this, by using a valid leaf certificate as a certificate authority (CA), to issue invalid certificates that will bypass authentication.

* References:
http://openssl.org/news/secadv_20150709.txt

* Platforms Affected:
OpenSSL 1.0.1n or 1.0.1o
Recommendation Upgrade to the latest version of OpenSSL (1.0.1p or later), available from the OpenSSL Web site at http://www.openssl.org/
Related URL CVE-2015-1793 (CVE)
Related URL 75652 (SecurityFocus)
Related URL (ISS)