FreeBSD : OpenSSL -- Cache timing vulnerability (8f353420-4197-11e8-8777-b499baebfeaf)

medium Nessus Plugin ID 109066

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The OpenSSL project reports :

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key.

Solution

Update the affected packages.

See Also

https://www.openssl.org/news/secadv/20180416.txt

http://www.nessus.org/u?a4f11f3b

Plugin Details

Severity: Medium

ID: 109066

File Name: freebsd_pkg_8f353420419711e88777b499baebfeaf.nasl

Version: 1.4

Type: local

Published: 4/17/2018

Updated: 11/10/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:openssl, p-cpe:/a:freebsd:freebsd:openssl-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 4/16/2018

Vulnerability Publication Date: 4/16/2018

Reference Information

CVE: CVE-2018-0737