| VID |
22824 |
| Severity |
20 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
According to its banner, the version of OpenSSL running on the remote host is 1.1.0 prior to 1.1.0h. It is, therefore, affected by a flaw related to handling AVX2 Montgomery Multiplication Procedure Exponentiation and user-supplied input that allows an attacker to derive information about the private key.
* References:
https://www.openssl.org/news/secadv/20171207.txt
* Platforms Affected:
OpenSSL 1.1.0 before 1.1.0h
Linux Any version Unix Any version Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of OpenSSL (1.1.0h or later), available from the OpenSSL Web site at http://www.openssl.org/ |
| Related URL |
CVE-2017-3738 (CVE) |
| Related URL |
102118 (SecurityFocus) |
| Related URL |
(ISS) |
|