VID |
22824 |
Severity |
20 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the version of OpenSSL running on the remote host is 1.1.0 prior to 1.1.0h. It is, therefore, affected by a flaw related to handling AVX2 Montgomery Multiplication Procedure Exponentiation and user-supplied input that allows an attacker to derive information about the private key.
* References:
https://www.openssl.org/news/secadv/20171207.txt
* Platforms Affected:
OpenSSL 1.1.0 before 1.1.0h
Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (1.1.0h or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2017-3738 (CVE) |
Related URL |
102118 (SecurityFocus) |
Related URL |
(ISS) |
|