AIX OpenSSL Advisory : openssl_advisory18.asc / openssl_advisory19.asc (DROWN)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote AIX host has a version of OpenSSL installed that is
affected by multiple vulnerabilities.

Description :

The version of OpenSSL installed on the remote AIX host is affected by
the following vulnerabilities :

- A key disclosure vulnerability exists due to improper
handling of cache-bank conflicts on the Intel
Sandy-bridge microarchitecture. An attacker can exploit
this to gain access to RSA key information.
(CVE-2016-0702)

- A double-free error exists due to improper validation of
user-supplied input when parsing malformed DSA private
keys. A remote attacker can exploit this to corrupt
memory, resulting in a denial of service condition or
the execution of arbitrary code. (CVE-2016-0705)

- A NULL pointer dereference flaw exists in the
BN_hex2bn() and BN_dec2bn() functions. A remote attacker
can exploit this to trigger a heap corruption, resulting
in the execution of arbitrary code. (CVE-2016-0797)

- A denial of service vulnerability exists due to improper
handling of invalid usernames. A remote attacker can
exploit this, via a specially crafted username, to leak
300 bytes of memory per connection, exhausting available
memory resources. (CVE-2016-0798)

- Multiple memory corruption issues exist that allow a
remote attacker to cause a denial of service condition
or the execution of arbitrary code. (CVE-2016-0799)

- A flaw exists that allows a cross-protocol
Bleichenbacher padding oracle attack known as DROWN
(Decrypting RSA with Obsolete and Weakened eNcryption).
This vulnerability exists due to a flaw in the Secure
Sockets Layer Version 2 (SSLv2) implementation, and it
allows captured TLS traffic to be decrypted. A
man-in-the-middle attacker can exploit this to decrypt
the TLS connection by utilizing previously captured
traffic and weak cryptography along with a series of
specially crafted connections to an SSLv2 server that
uses the same private key. (CVE-2016-0800)

- A denial of service vulnerability exists due to improper
verification of memory allocation by the doapr_outch()
function in file crypto/bio/b_print.c. A remote attacker
can exploit this, via a specially crafted string, to
write data out-of-bounds or exhaust memory resources or
possibly have other unspecified impact. (CVE-2016-2842)

See also :

http://aix.software.ibm.com/aix/efixes/security/openssl_advisory18.asc
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory19.asc
https://www.drownattack.com/drown-attack-paper.pdf
https://drownattack.com/
https://www.openssl.org/news/secadv/20160301.txt

Solution :

A fix is available and can be downloaded from the IBM AIX website.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: AIX Local Security Checks

Nessus Plugin ID: 90448 ()

Bugtraq ID:

CVE ID: CVE-2016-0702
CVE-2016-0705
CVE-2016-0797
CVE-2016-0798
CVE-2016-0799
CVE-2016-0800
CVE-2016-2842

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now