OpenSSL < 0.9.8q / 1.0.0c Multiple Vulnerabilities

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

The remote web server is affected by multiple vulnerabilities.

Description :

According to its banner, the remote web server is running a version
of OpenSSL older than 0.9.8q or 1.0.0c. Such versions are potentially
affected by multiple vulnerabilities :

- It may be possible to downgrade the ciphersuite to a
weaker version by modifying the stored session cache
ciphersuite.

- An error exists in the J-PAKE implementation that could
lead to successful validation by someone with no
knowledge of the shared secret.

See also :

https://www.openssl.org/news/secadv/20101202.txt
http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf

Solution :

Upgrade to OpenSSL 0.9.8q / 1.0.0c or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 51058 ()

Bugtraq ID: 45163
45164

CVE ID: CVE-2010-4180
CVE-2010-4252

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial