Ubuntu Security Notice (C) 2014-2016 Canonical, Inc. / NASL script (C) 2014-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
For compatibility reasons, OpenSSL in Ubuntu 12.04 LTS disables
TLSv1.2 by default when being used as a client. When forcing the use
of TLSv1.2, another compatibility feature
(OPENSSL_MAX_TLS1_2_CIPHER_LENGTH) was used that would truncate the
cipher list. This would prevent certain ciphers from being selected,
and would prevent secure renegotiations. This update removes the
cipher list truncation workaround when forcing the use of TLSv1.2.
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected libssl1.0.0 package.
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now