Vulnerability in TLS Could Allow Information Disclosure (2655992) (uncredentialed check)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

It may be possible to obtain sensitive information from the remote
host with TLS-enabled services.

Description :

The remote TLS server does not verify block cipher padding when
using a cipher suite that employs a block cipher such as AES and
DES. The lack of padding checking can allow encrypted TLS traffic
to be decrypted. This vulnerability could allow for the decryption
of HTTPS traffic by an unauthorized third party.

See also :

http://www.openssl.org/~bodo/tls-cbc.txt

Solution :

Microsoft has released a set of patches for Windows XP, 2003, Vista,
2008, 7, and 2008 R2 :

http://technet.microsoft.com/en-us/security/bulletin/MS12-049

For other TLS implementations, contact the vendor for update.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: General

Nessus Plugin ID: 60016 ()

Bugtraq ID: 54304

CVE ID: CVE-2012-1870