| VID |
22704 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
According to its banner, the remote web server uses a version of OpenSSL which is 0.9.8 prior to 0.9.8zh. It is affected by a flaw in the ASN1_TFLG_COMBINE implementation in file tasn_dec.c related to handling malformed X509_ATTRIBUTE structures. A remote attacker can exploit this to cause a memory leak by triggering a decoding failure in a PKCS#7 or CMS application, resulting in a denial of service.
* References: https://www.openssl.org/news/secadv/20151203.txt
* Platforms Affected: OpenSSL 0.9.8 before 0.9.8zh Linux Any version Unix Any version Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of OpenSSL (0.9.8zh or later), available from the OpenSSL Web site at http://www.openssl.org/ |
| Related URL |
CVE-2015-3195 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|