VID |
22768 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the remote host is running a version of OpenSSL 1.1.0 prior to 1.1.0d. It is, therefore, affected by the following vulnerabilities :
- A NULL pointer dereference flaw exists within file ssl/statem/statem_clnt.c when handling parameters for the DHE or ECDHE key exchanges. An unauthenticated, remote attacker can exploit this, via specially crafted parameters, to cause a denial of service condition. (CVE-2017-3730)
- An out-of-bounds read error exists when handling packets using the CHACHA20/POLY1305 or RC4-MD5 ciphers. An unauthenticated, remote attacker can exploit this, via specially crafted truncated packets, to cause a denial of service condition. (CVE-2017-3731)
- A carry propagating error exists in the x86_64 Montgomery squaring implementation that may cause the BN_mod_exp() function to produce incorrect results. An unauthenticated, remote attacker with sufficient resources can exploit this to obtain sensitive information regarding private keys. (CVE-2017-3732)
* References: https://www.openssl.org/news/secadv/20170126.txt
* Platforms Affected: OpenSSL 1.1.0 before 1.1.0d Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (1.1.0d or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2017-3730,CVE-2017-3731,CVE-2017-3732 (CVE) |
Related URL |
95812,95813,95814 (SecurityFocus) |
Related URL |
(ISS) |
|