VID |
22968 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of OpenSSL installed on the remote host is 1.0.2 prior to 1.0.2w. It is, therefore, affected by a vulnerability as referenced in the 1.0.2w advisory. The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites.
* References: https://www.openssl.org/news/secadv/20200909.txt https://www.openssl.org/news/vulnerabilities.html
* Platforms Affected: OpenSSL 1.0.2x before 1.0.2w Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (1.0.2w or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2020-1968 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|