WinSCP Heartbeat Information Disclosure (Heartbleed)

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an application that is affected by
multiple vulnerabilities.

Description :

The WinSCP program installed on the remote host is version 4.x later
than 4.3.7, 5.x later than 5.0.6 and prior to 5.5.3. It is, therefore,
affected by the following vulnerabilities :

- An out-of-bounds read error, known as the 'Heartbleed
Bug', exists related to handling TLS heartbeat
extensions that allow an attacker to obtain sensitive
information such as primary key material, secondary key
material, and other protected content. (CVE-2014-0160)

- An error exists related to X.509 certificates, FTP
with TLS, and host validation that allows an attacker to
spoof a server and obtain sensitive information.
(CVE-2014-2735)

See also :

http://seclists.org/bugtraq/2014/Apr/90
http://winscp.net/tracker/show_bug.cgi?id=1151
http://winscp.net/tracker/show_bug.cgi?id=1152
http://winscp.net/eng/docs/history#5.5.3
http://heartbleed.com/
http://eprint.iacr.org/2014/140
http://www.openssl.org/news/vulnerabilities.html#2014-0160
https://www.openssl.org/news/secadv/20140407.txt

Solution :

Upgrade to WinSCP version 5.5.3 or later.

Risk factor :

High / CVSS Base Score : 9.4
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N)
CVSS Temporal Score : 7.4
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 73613 ()

Bugtraq ID: 66690
66936

CVE ID: CVE-2014-0160
CVE-2014-2735

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now