How to Buy
This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.
The remote mail server is affected by an information disclosure
According to its banner, the remote host is running a version of Kerio
Connect (formerly known Kerio MailServer) prior to 8.1.0. It is,
therefore, affected by an information disclosure vulnerability, known
as BEAST, in the SSL 3.0 and TLS 1.0 protocols due to a flaw in the
way the initialization vector (IV) is selected when operating in
cipher-block chaining (CBC) modes. A man-in-the-middle attacker can
exploit this to obtain plaintext HTTP header data, by using a
blockwise chosen-boundary attack (BCBA) on an HTTPS session, in
the Java URLConnection API, or the Silverlight WebClient API.
TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are
See also :
Upgrade to Kerio Connect 8.1.0 or later.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : false
Nessus Plugin ID: 72393 ()
Bugtraq ID: 49778
CVE ID: CVE-2011-3389
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.