VID |
22705 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the remote web server uses a version of OpenSSL which is 1.0.0 prior to 1.0.0t. Such versions may be affected by the following vulnerabilities :
- A flaw exists in the ASN1_TFLG_COMBINE implementation in file tasn_dec.c related to handling malformed X509_ATTRIBUTE structures. A remote attacker can exploit this to cause a memory leak by triggering a decoding failure in a PKCS#7 or CMS application, resulting in a denial of service. (CVE-2015-3195)
- A race condition exists in s3_clnt.c that is triggered when PSK identity hints are incorrectly updated in the parent SSL_CTX structure when they are received by a multi-threaded client. A remote attacker can exploit this, via a crafted ServerKeyExchange message, to cause a double-free memory error, resulting in a denial of service. (CVE-2015-3196)
* References: https://www.openssl.org/news/secadv/20151203.txt
* Platforms Affected: OpenSSL 1.0.0 before 1.0.0t Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (1.0.0t or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2015-3195,CVE-2015-3196 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|