How to Buy
This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote device is potentially affected by multiple vulnerabilities.
The remote Blue Coat ProxySG device's SGOS self-reported version is
6.5 prior to 126.96.36.199 and, therefore, contains a bundled version of
OpenSSL that contains multiple flaws. It is, therefore, potentially
affected by the following vulnerabilities :
- An error exists in the function 'ssl3_read_bytes'
that could allow data to be injected into other
sessions or allow denial of service attacks. Note
this issue is only exploitable if
'SSL_MODE_RELEASE_BUFFERS' is enabled. (CVE-2010-5298)
- An error exists in the function 'do_ssl3_write' that
could allow a NULL pointer to be dereferenced leading
to denial of service attacks. Note this issue is
exploitable only if 'SSL_MODE_RELEASE_BUFFERS' is
- An unspecified error exists that could allow an
attacker to cause usage of weak keying material,
leading to simplified man-in-the-middle attacks.
See also :
Upgrade to version 188.8.131.52 or later.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.3
Public Exploit Available : true
Nessus Plugin ID: 76165 ()
Bugtraq ID: 668016719367899
CVE ID: CVE-2010-5298CVE-2014-0198CVE-2014-0224
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.