OpenSSL < 0.9.8o / 1.0.0a Multiple Vulnerabilities

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote web server has a SSL-related vulnerability.

Description :

According to its banner, the remote web server is running a version
of OpenSSL older than 0.9.8o / 1.0.0a. Such versions have the
following vulnerabilities :

- The mishandling of Cryptographic Message Syntax
structures containing an OriginatorInfo element can
lead to data being written to invalid memory addresses
or memory being freed up twice. (CVE-2010-0742)

- An uninitialized buffer of undefined length is returned
when verification recovery fails for RSA keys. This
allows an attacker to bypass key checks in applications
calling the function EVP_PKEY_verify_recover(). Note
this function is not used by OpenSSLcode itself.
(CVE-2010-1633)

See also :

http://www.openssl.org/news/secadv_20100601.txt

Solution :

Upgrade to OpenSSL 0.9.8o / 1.0.0a or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 46801 ()

Bugtraq ID: 40502
40503

CVE ID: CVE-2010-0742
CVE-2010-1633