VID |
22707 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the remote web server uses a version of OpenSSL which is 1.0.2 prior to 1.0.2e. Such versions may be affected by the following vulnerabilities :
- A flaw exists in the ssl3_get_key_exchange() function in file s3_clnt.c when handling a ServerKeyExchange message for an anonymous DH ciphersuite with the value of 'p' set to 0. A attacker can exploit this, by causing a segmentation fault, to crash an application linked against the library, resulting in a denial of service. (CVE-2015-1794)
- A carry propagating flaw exists in the x86_64 Montgomery squaring implementation that may cause the BN_mod_exp() function to produce incorrect results. An attacker can exploit this to obtain sensitive information regarding private keys. (CVE-2015-3193)
- A NULL pointer dereference flaw exists in file rsa_ameth.c when handling ASN.1 signatures that use the RSA PSS algorithm but are missing a mask generation function parameter. A remote attacker can exploit this to cause the signature verification routine to crash, leading to a denial of service. (CVE-2015-3194)
- A flaw exists in the ASN1_TFLG_COMBINE implementation in file tasn_dec.c related to handling malformed X509_ATTRIBUTE structures. A remote attacker can exploit this to cause a memory leak by triggering a decoding failure in a PKCS#7 or CMS application, resulting in a denial of service. (CVE-2015-3195)
* References: https://www.openssl.org/news/secadv/20151203.txt https://mta.openssl.org/pipermail/openssl-commits/2015-August/001540.html
* Platforms Affected: OpenSSL 1.0.2 before 1.0.2e Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (1.0.2e or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2015-1794,CVE-2015-3193,CVE-2015-3194,CVE-2015-3195 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|