Amazon Linux AMI : openssl Information Disclosure Vulnerability (ALAS-2014-320)

High Nessus Plugin ID 73438

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 7.4


The remote Amazon Linux AMI host is missing a security update.


A missing bounds check was found in the way OpenSSL handled TLS heartbeat extension packets. This flaw could be used to reveal up to 64k of memory from a connected client or server.


Run 'yum update openssl' to update your system and restart all services that are using openssl.  While the new package is still named openssl-1.0.1e, it does contain the fix for CVE-2014-0160.

See Also

Plugin Details

Severity: High

ID: 73438

File Name: ala_ALAS-2014-320.nasl

Version: Revision: 1.6

Type: local

Agent: unix

Published: 2014/04/09

Updated: 2015/09/01

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 7.4

CVSS v2.0

Base Score: 9.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:openssl, p-cpe:/a:amazon:linux:openssl-debuginfo, p-cpe:/a:amazon:linux:openssl-devel, p-cpe:/a:amazon:linux:openssl-perl, p-cpe:/a:amazon:linux:openssl-static, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/04/07

Exploitable With

Core Impact

Metasploit (OpenSSL Heartbeat (Heartbleed) Information Leak)

Reference Information

CVE: CVE-2014-0160

ALAS: 2014-320