AIX OpenSSL Advisory : openssl_advisory16.asc (SLOTH)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote AIX host has a version of OpenSSL installed that is
affected by a collision-based forgery vulnerability.

Description :

The remote AIX host has a version of OpenSSL installed that is
affected by a collision-based forgery vulnerability, known as SLOTH
(Security Losses from Obsolete and Truncated Transcript Hashes), in
the TLS protocol due to accepting RSA-MD5 signatures in the server
signature within the TLS 1.2 ServerKeyExchange messages during a TLS
handshake. A man-in-the-middle attacker can exploit this, via a
transcript collision attack, to impersonate a TLS server.

See also :

http://aix.software.ibm.com/aix/efixes/security/openssl_advisory16.asc
http://www.mitls.org/downloads/transcript-collisions.pdf
http://www.mitls.org/pages/attacks/SLOTH

Solution :

A fix is available and can be downloaded from the IBM AIX website.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:U/RL:ND/RC:C)
Public Exploit Available : false

Family: AIX Local Security Checks

Nessus Plugin ID: 88591 ()

Bugtraq ID: 79684

CVE ID: CVE-2015-7575

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now