AIX OpenSSL Advisory : openssl_advisory5.asc

medium Nessus Plugin ID 73563

Synopsis

The remote AIX host is running a vulnerable version of OpenSSL.

Description

The version of OpenSSL running on the remote host is affected by the following vulnerabilities :

- The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side- channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the 'Lucky Thirteen' issue. (CVE-2013-0169)

- OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
(CVE-2013-0166)

Solution

A fix is available, and it can be downloaded from the AIX website.

To extract the fixes from the tar file :

zcat openssl-0.9.8.2500.tar.Z | tar xvf - or zcat openssl-fips-12.9.8.2500.tar.Z | tar xvf -

IMPORTANT : If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding.

To preview the fix installation :

installp -apYd . openssl

To install the fix package :

installp -aXYd . openssl

See Also

https://aix.software.ibm.com/aix/efixes/security/openssl_advisory5.asc

https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp

Plugin Details

Severity: Medium

ID: 73563

File Name: aix_openssl_advisory5.nasl

Version: 1.9

Type: local

Published: 4/16/2014

Updated: 4/21/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/o:ibm:aix

Required KB Items: Host/local_checks_enabled, Host/AIX/version, Host/AIX/lslpp

Exploit Ease: No known exploits are available

Patch Publication Date: 3/15/2013

Vulnerability Publication Date: 2/4/2013

Reference Information

CVE: CVE-2013-0166, CVE-2013-0169

BID: 57778, 60268

CERT: 737740