GLSA-201404-07 : OpenSSL: Information Disclosure

high Nessus Plugin ID 73407
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-201404-07 (OpenSSL: Information Disclosure)

Multiple vulnerabilities have been found in OpenSSL:
OpenSSL incorrectly handles memory in the TLS heartbeat extension, leading to information disclosure of 64kb per request, possibly including private keys (“Heartbleed bug”, OpenSSL 1.0.1 only, CVE-2014-0160).
The Montgomery ladder implementation of OpenSSL improperly handles swap operations (CVE-2014-0076).
Impact :

A remote attacker could exploit these issues to disclose information, including private keys or other sensitive information, or perform side-channel attacks to obtain ECDSA nonces.
Workaround :

Disabling the tls-heartbeat USE flag (enabled by default) provides a workaround for the CVE-2014-0160 issue.


All OpenSSL users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-libs/openssl-1.0.1g' Note: All services using OpenSSL to provide TLS connections have to be restarted for the update to take effect. Utilities like app-admin/lib_users can aid in identifying programs using OpenSSL.
As private keys may have been compromised using the Heartbleed attack, it is recommended to regenerate them.

See Also

Plugin Details

Severity: High

ID: 73407

File Name: gentoo_GLSA-201404-07.nasl

Version: 1.14

Type: local

Published: 4/8/2014

Updated: 1/6/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: High

Score: 7.5


Risk Factor: High

Base Score: 9.4

Temporal Score: 7.8

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:N

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:openssl, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/8/2014

Exploitable With

Core Impact

Metasploit (OpenSSL Heartbeat (Heartbleed) Information Leak)

Reference Information

CVE: CVE-2014-0076, CVE-2014-0160

BID: 66363

GLSA: 201404-07