AIX OpenSSL Advisory : openssl_advisory14.asc (Logjam)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote AIX host has a version of OpenSSL installed that is
affected by multiple vulnerabilities.

Description :

The version of OpenSSL installed on the remote AIX host is affected by
multiple vulnerabilities :

- An invalid free memory error exists due to improper
validation of user-supplied input when a DTLS peer
receives application data between ChangeCipherSpec and
Finished messages. A remote attacker can exploit this to
corrupt memory, resulting in a denial of service or
the execution of arbitrary code. (CVE-2014-8176)

- A denial of service vulnerability exists when processing
an ECParameters structure due to an infinite loop that
occurs when a specified curve is over a malformed binary
polynomial field. A remote attacker can exploit this to
perform a denial of service against any system that
processes public keys, certificate requests, or
certificates. This includes TLS clients and TLS servers
with client authentication enabled. (CVE-2015-1788)

- A denial of service vulnerability exists due to improper
validation of the content and length of the ASN1_TIME
string by the X509_cmp_time() function. A remote
attacker can exploit this, via a malformed certificate
and CRLs of various sizes, to cause a segmentation
fault, resulting in a denial of service condition. TLS
clients that verify CRLs are affected. TLS clients and
servers with client authentication enabled may be
affected if they use custom verification callbacks.
(CVE-2015-1789)

- A NULL pointer dereference flaw exists in the PKCS#7
parsing code due to incorrect handling of missing inner
'EncryptedContent'. This allows a remote attacker, via
specially crafted ASN.1-encoded PKCS#7 blobs with
missing content, to cause a denial of service condition
or other potential unspecified impacts. (CVE-2015-1790)

- A double-free error exists due to a race condition that
occurs when a NewSessionTicket is received by a
multi-threaded client when attempting to reuse a
previous ticket. (CVE-2015-1791)

- A denial of service vulnerability exists in the CMS code
due to an infinite loop that occurs when verifying a
signedData message. A remote attacker can exploit this
to cause a denial of service condition. (CVE-2015-1792)

- A man-in-the-middle vulnerability, known as Logjam,
exists due to a flaw in the SSL/TLS protocol. A remote
attacker can exploit this flaw to downgrade connections
using ephemeral Diffie-Hellman key exchange to 512-bit
export-grade cryptography. (CVE-2015-4000)

See also :

http://aix.software.ibm.com/aix/efixes/security/openssl_advisory14.asc
https://www-01.ibm.com/marketing/iwm/iwm/web/preLogin.do?source=aixbp
https://www.openssl.org/news/secadv/20150611.txt

Solution :

A fix is available and can be downloaded from the AIX website.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: AIX Local Security Checks

Nessus Plugin ID: 84880 ()

Bugtraq ID: 74733
75154
75156
75157
75158
75159
75161

CVE ID: CVE-2014-8176
CVE-2015-1788
CVE-2015-1789
CVE-2015-1790
CVE-2015-1791
CVE-2015-1792
CVE-2015-4000

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now