How to Buy
This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote web server contains an application that is affected by
multiple OpenSSL-related vulnerabilities.
According to its version number, the Splunk Web hosted on the remote
web server is 6.x prior to 6.0.3. It is, therefore, affected by
multiple OpenSSL-related vulnerabilities :
- A flaw exists with the OpenSSL version being used by
Splunk with the 'ssl3_take_mac' in 'ssl/s3_both.c'. This
allows a remote attacker to cause a denial of service
with a specially crafted request. (CVE-2013-4353)
- An out-of-bounds read error, known as Heartbleed, exists
in the TLS/DTLS implementation due to improper handling
of TLS heartbeat extension packets. A remote attacker,
using crafted packets, can trigger a buffer over-read,
resulting in the disclosure of up to 64KB of process
memory, which contains sensitive information such as
primary key material, secondary key material, and other
protected content. (CVE-2014-0160)
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.
See also :
Upgrade to Splunk 6.0.3 or later.
Risk factor :
High / CVSS Base Score : 9.4
CVSS Temporal Score : 7.4
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 73575 ()
Bugtraq ID: 6469166690
CVE ID: CVE-2013-4353CVE-2014-0160
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.