VID |
22858 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the version of OpenSSL running on the remote host is 1.1.0 prior to 1.1.0i. It is, therefore, affected by a denial of service vulnerability and a cache timing side channel vulnerability.
* References: https://www.openssl.org/news/secadv/20180612.txt https://www.openssl.org/news/secadv/20180416.txt
* Platforms Affected: OpenSSL 1.1.0 before 1.1.0i Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (1.1.0i or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2018-0732,CVE-2018-0737 (CVE) |
Related URL |
103766,104442 (SecurityFocus) |
Related URL |
(ISS) |
|