OpenSSL < 0.9.8h Multiple Vulnerabilities

medium Nessus Plugin ID 56996
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote web server has multiple SSL-related vulnerabilities.

Description

According to its banner, the remote web server uses a version of OpenSSL older than 0.9.8h. As such, it may be affected by the following vulnerabilities :

- A double-free error exists related to the handling of server name extension data and specially crafted TLS 1.0 'Client Hello' packets. This can cause application crashes. Note that successful exploitation requires that OpenSSL is compiled with the TLS server name extensions.
(CVE-2008-0891)

- A NULL pointer dereference error exists related to anonymous Diffie-Hellman key exchange and TLS handshakes. This can be exploited by omitting the 'Server Key exchange message' from the handshake and can cause application crashes. (CVE-2008-1672)

- On 32-bit builds, an information disclosure vulnerability exists during certain calculations for NIST elliptic curves P-256 or P-384. This error can allow an attacker to recover the private key of the TLS server.

The following are required for exploitation :

- 32-bit build
- Use of elliptic curves P-256 and/or P-384
- Either the use of ECDH family ciphers and/or the use of ECDHE family ciphers without the SSL_OP_SINGLE_ECDH_USE context option

(CVE-2011-4354)

Note that Nessus has not attempted to verify that these issues are actually exploitable or have been patched but instead has relied on the version number found in the Server response header.

Solution

Upgrade to OpenSSL 0.9.8h or later or apply the vendor-supplied patches.

See Also

https://www.openwall.com/lists/oss-security/2011/12/01/6

https://www.openssl.org/news/secadv/20080528.txt

Plugin Details

Severity: Medium

ID: 56996

File Name: openssl_0_9_8h.nasl

Version: 1.12

Type: remote

Family: Web Servers

Published: 12/2/2011

Updated: 11/15/2018

Dependencies: openssl_version.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Required KB Items: openssl/port

Exploit Ease: No known exploits are available

Patch Publication Date: 5/28/2008

Vulnerability Publication Date: 5/28/2008

Reference Information

CVE: CVE-2008-0891, CVE-2008-1672, CVE-2011-4354

BID: 29405, 50882

CERT: 520586, 661475

CWE: 189, 287