Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

OpenSSL 1.0.1 < 1.0.1s / 1.0.2 < 1.0.2g RCE

Critical

Synopsis

The remote web server is running an outdated instance of OpenSSL and that is affected by a remote code execution (RCE) vulnerability.

Description

According to its banner, the version of OpenSSL on the remote host is 1.0.2 prior to 1.0.2g or 1.0.1 prior to 1.0.1s and is affected by a flaw in the 'doapr_outch()' function within 'crypto/bio/b_print.c' that is triggered when failing to allocate memory, as the function's return value has no way to signal this error to a calling function. This may allow a context-dependent attacker to corrupt memory and crash a process linked against the library or potentially execute arbitrary code.

Solution

Upgrade OpenSSL to version 1.0.2g or higher. If 1.0.2 cannot be obtained, 1.0.1s has also been patched for this vulnerability.