AIX OpenSSL Advisory : openssl_advisory7.doc (Heartbleed)

high Nessus Plugin ID 73472
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote AIX host is running a vulnerable version of OpenSSL.


The version of OpenSSL running on the remote host is affected by an information disclosure vulnerability.

OpenSSL incorrectly handles memory in the TLS heartbeat extension, potentially allowing a remote attacker to read the contents of up to 64KB of server memory, potentially exposing passwords, private keys, and other sensitive data.


Install the appropriate interim fix. Additionally, to address this issue you must :

- Replace your SSL certificates by revoking existing certificates and reissuing new certificates, with a new private key generated by 'openssl genrsa'.

- Reset User Credentials Force users to reset their passwords and revoke any existing cookies or authentication prior to the re-authentication.

See Also

Plugin Details

Severity: High

ID: 73472

File Name: aix_openssl_advisory7.nasl

Version: 1.11

Type: local

Published: 4/11/2014

Updated: 1/4/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: High

Score: 7.3


Risk Factor: High

Base Score: 9.4

Temporal Score: 7.4

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:N

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:ibm:aix, cpe:/a:openssl:openssl

Required KB Items: Host/AIX/lslpp, Host/local_checks_enabled, Host/AIX/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/10/2014

Vulnerability Publication Date: 4/7/2014

Exploitable With

Core Impact

Reference Information

CVE: CVE-2014-0160

BID: 66690

CERT: 720951

EDB-ID: 32745, 32764