This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
The remote Amazon Linux AMI host is missing a security update.
A NULL pointer dereference flaw was found in the way OpenSSL parsed
Secure/Multipurpose Internet Mail Extensions (S/MIME) messages. An
attacker could use this flaw to crash an application that uses OpenSSL
to decrypt or verify S/MIME messages. (CVE-2012-1165)
A flaw was found in the PKCS#7 and Cryptographic Message Syntax (CMS)
implementations in OpenSSL. An attacker could possibly use this flaw
to perform a Bleichenbacher attack to decrypt an encrypted CMS,
PKCS#7, or S/MIME message by sending a large number of chosen
ciphertext messages to a service using OpenSSL and measuring error
response times. (CVE-2012-0884)
This update also fixes a regression caused by the fix for
CVE-2011-4619, released via ALAS-2012-38, which caused Server Gated
Cryptography (SGC) handshakes to fail.
See also :
Run 'yum update openssl' to upgrade your system. For the update to
take effect, all services linked to the OpenSSL library must be
restarted, or the system rebooted.
Risk factor :
Medium / CVSS Base Score : 5.0