Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

OpenSSL 0.9.x < 0.9.6 MitM (Crosswalk)

Medium

Synopsis

The remote web server is running an outdated instance of OpenSSL and that is affected by a Man in the Middle (MitM) attack vector.

Description

According to its banner, the version of OpenSSL on the remote host is 0.9.x prior to 0.9.6 and is affected by a flaw as X.509 certificates are not properly validated. By spoofing the TLS/SSL server via a certificate that appears valid, an attacker with the ability to intercept network traffic (e.g. MitM, DNS cache poisoning) can disclose and optionally manipulate transmitted data.

Solution

Upgrade OpenSSL to version 0.9.6 or higher