AIX OpenSSL Advisory : openssl_advisory2.asc

high Nessus Plugin ID 73560

Synopsis

The remote AIX host is running a vulnerable version of OpenSSL.

Description

The version of OpenSSL running on the remote host is affected by the following vulnerabilities :

- ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka 'OCSP stapling vulnerability.' (CVE-2011-0014)

- Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi- threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap- based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
(CVE-2010-3864)

- OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier. (CVE-2010-4180)

Solution

A fix is available, and it can be downloaded from the AIX website.

To extract the fixes from the tar file :

zcat openssl.0.9.8.1302.tar.Z | tar xvf - or zcat openssl-fips.12.9.8.1302.tar.Z | tar xvf - or zcat openssl.0.9.8.808.tar.Z | tar xvf -

IMPORTANT : If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding.

To preview the fix installation :

installp -apYd . openssl

To install the fix package :

installp -aXYd . openssl

See Also

https://aix.software.ibm.com/aix/efixes/security/openssl_advisory2.asc

https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp

https://www.openssl.org/news/secadv/20110208.txt

https://www.openssl.org/news/secadv/20101116.txt

Plugin Details

Severity: High

ID: 73560

File Name: aix_openssl_advisory2.nasl

Version: 1.11

Type: local

Published: 4/16/2014

Updated: 4/21/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 6.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:ibm:aix

Required KB Items: Host/AIX/lslpp, Host/local_checks_enabled, Host/AIX/version

Exploit Ease: No known exploits are available

Patch Publication Date: 11/4/2011

Vulnerability Publication Date: 11/17/2010

Reference Information

CVE: CVE-2010-3864, CVE-2010-4180, CVE-2011-0014

BID: 44884, 45164, 46264