SynopsisThe remote AIX host is running a vulnerable version of OpenSSL.
DescriptionThe version of OpenSSL running on the remote host is affected by the following vulnerabilities :
- A vulnerability in the way SSL and TLS protocols allow renegotiation requests may allow an attacker to inject plaintext into an application protocol stream. This could result in a situation where the attacker may be able to issue commands to the server that appear to be coming from a legitimate source.
- A remote, unauthenticated attacker may be able to inject an arbitrary amount of chosen plaintext into the beginning of the application protocol stream. This could allow an attacker to issue HTTP requests or take action impersonating the user, among other consequences.
Please note that the recommended fixes will disable all session renegotiation.
SolutionA fix is available, and it can be downloaded from the AIX website.
To extract the fixes from the tar file :
zcat openssl.0.9.8.1102.tar.Z | tar xvf - or zcat openssl-fips.126.96.36.1992.tar.Z | tar xvf - or zcat openssl.0.9.8.805.tar.Z | tar xvf -
IMPORTANT : If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding.
To preview the fix installation :
installp -apYd . openssl
To install the fix package :
installp -aXYd . openssl