OpenSSL < 0.9.8l Multiple Vulnerabilities

medium Nessus Plugin ID 17765


The remote server is affected by multiple vulnerabilities.


According to its banner, the remote server is running a version of OpenSSL that is earlier than 0.9.8l. As such, it may be affected by multiple vulnerabilities :

- A remote attacker could crash the server by sending malformed ASN.1 data. This flaw only affects some architectures, Win64 and other unspecified platforms. (CVE-2009-0789)

- A remote attacker could saturate the server by sending a big number of 'future epoch' DTLS records. (CVE-2009-1377)

- A remote attacker could saturate the server by sending duplicate DTLS records, or DTLS records with too big sequence numbers. (CVE-2009-1378)

- A remote attacker could spoof certificates by computing MD2 hash collisions. (CVE-2009-2409)


Upgrade to OpenSSL 0.9.8l or later.

See Also

Plugin Details

Severity: Medium

ID: 17765

File Name: openssl_0_9_8l.nasl

Version: 1.20

Type: combined

Agent: windows, macosx, unix

Family: Web Servers

Published: 1/4/2012

Updated: 8/22/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Medium

Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2009-2409

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Required KB Items: installed_sw/OpenSSL

Exploit Ease: No known exploits are available

Patch Publication Date: 11/5/2009

Vulnerability Publication Date: 5/15/2009

Reference Information

CVE: CVE-2009-0789, CVE-2009-1377, CVE-2009-1378, CVE-2009-2409

BID: 34256, 35001

CWE: 119, 189, 310, 399