OpenSSL < 0.9.6m / 0.9.7d Denial of Service

Medium Nessus Plugin ID 17750

Synopsis

The remote server is vulnerable to a denial of service attack.

Description

According to its banner, the remote server is running a version of OpenSSL that is earlier than 0.9.6m or 0.9.7d.

A remote attacker can crash the server by sending an overly long Kerberos ticket or a crafted SSL/TLS handshake.

Solution

Upgrade to OpenSSL 0.9.6m / 0.9.7d or later.

See Also

https://www.us-cert.gov/ncas/alerts/ta04-078a

https://www.openssl.org/news/secadv/20040317.txt

http://marc.info/?l=bugtraq&m=107953412903636&w=2

Plugin Details

Severity: Medium

ID: 17750

File Name: openssl_0_9_6m_0_9_7d.nasl

Version: 1.10

Type: remote

Family: Web Servers

Published: 2012/01/04

Updated: 2018/11/15

Dependencies: 57323

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2004/03/17

Vulnerability Publication Date: 2004/03/17

Reference Information

CVE: CVE-2004-0079, CVE-2004-0112

BID: 9899

CERT: 484726