This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
Researchers discovered a timing-based attack on RSA keys that OpenSSL
is generally vulnerable to, unless RSA blinding is enabled. Patches
from the OpenSSL team have been applied to turn RSA blinding on by
An extension of the 'Bleichenbacher attack' on RSA with PKS #1 v1.5
padding as used in SSL 3.0 and TSL 1.0 was also created by Czech
cryptologists Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa. This
attack requires the attacker to open millions of SSL/TLS connections
to the server they are attacking. This is done because the server's
behaviour when faced with specially crafted RSA ciphertexts can reveal
information that would in effect allow the attacker to perform a
single RSA private key operation on a ciphertext of their choice,
using the server's RSA key. Despite this, the server's RSA key is not
compromised at any time. Patches from the OpenSSL team modify SSL/TLS
server behaviour to avoid this vulnerability.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5