OpenSSL < 0.9.6j / 0.9.7b Multiple Vulnerabilities

medium Nessus Plugin ID 11267

Synopsis

The remote host has an application that is affected by multiple vulnerabilities.

Description

According to its banner, the remote host is using a version of OpenSSL older than 0.9.6j or 0.9.7b.

This version is vulnerable to a timing-based attack that could allow an attacker to guess the content of fixed data blocks and may eventually be able to guess the value of the private RSA key of the server.

An attacker may use this implementation flaw to sniff the data going to this host and decrypt some parts of it, as well as impersonate the server and perform man-in-the-middle attacks.

Solution

Upgrade to version 0.9.6j (0.9.7b) or newer.

See Also

https://www.openssl.org/news/secadv/20030219.txt

http://eprint.iacr.org/2003/052/

Plugin Details

Severity: Medium

ID: 11267

File Name: openssl_password_interception.nasl

Version: 1.44

Type: remote

Family: Web Servers

Published: 2/20/2003

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/10/2003

Vulnerability Publication Date: 2/19/2003

Reference Information

CVE: CVE-2003-0078, CVE-2003-0131, CVE-2003-0147

BID: 6884, 7148

RHSA: 2003:101-01

SuSE: SUSE-SA:2003:024