This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.
The remote Nessus installation is affected by multiple denial of
service vulnerabilities in the bundled OpenSSL component.
According to its version, the installation of Tenable Nessus running
on the remote host is version 5.x prior to 5.2.12 or 6.x prior to 6.4.
It is, therefore, affected by multiple denial of service
vulnerabilities in the bundled OpenSSL component :
- A denial of service vulnerability exists when processing
an ECParameters structure due to an infinite loop that
occurs when a specified curve is over a malformed binary
polynomial field. A remote attacker can exploit this to
perform a denial of service against any system that
processes public keys, certificate requests, or
certificates. This includes TLS clients and TLS servers
with client authentication enabled. (CVE-2015-1788)
- A denial of service vulnerability exists due to improper
validation of the content and length of the ASN1_TIME
string by the X509_cmp_time() function. A remote
attacker can exploit this, via a malformed certificate
and CRLs of various sizes, to cause a segmentation
fault, resulting in a denial of service condition. TLS
clients that verify CRLs are affected. TLS clients and
servers with client authentication enabled may be
affected if they use custom verification callbacks.
See also :
Upgrade to Tenable Nessus 5.2.12 / 6.4 or later.
Risk factor :
High / CVSS Base Score : 8.5
CVSS Temporal Score : 6.7
Public Exploit Available : true