Splunk 6.x < 6.0.3 Multiple OpenSSL Vulnerabilities (Heartbleed)

Medium Nessus Plugin ID 73575


The remote web server contains an application that is affected by multiple OpenSSL-related vulnerabilities.


According to its version number, the Splunk Web hosted on the remote web server is 6.x prior to 6.0.3. It is, therefore, affected by multiple OpenSSL-related vulnerabilities :

- A flaw exists with the OpenSSL version being used by Splunk with the 'ssl3_take_mac' in 'ssl/s3_both.c'. This allows a remote attacker to cause a denial of service with a specially crafted request. (CVE-2013-4353)

- An out-of-bounds read error, known as Heartbleed, exists in the TLS/DTLS implementation due to improper handling of TLS heartbeat extension packets. A remote attacker, using crafted packets, can trigger a buffer over-read, resulting in the disclosure of up to 64KB of process memory, which contains sensitive information such as primary key material, secondary key material, and other protected content. (CVE-2014-0160)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Upgrade to Splunk 6.0.3 or later.

See Also







Plugin Details

Severity: Medium

ID: 73575

File Name: splunk_603.nasl

Version: 1.16

Type: remote

Family: Web Servers

Published: 2014/04/16

Updated: 2019/11/26

Dependencies: 49069, 47619

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2014-0160

CVSS v2.0

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:splunk:splunk

Required KB Items: installed_sw/Splunk

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/04/10

Vulnerability Publication Date: 2014/02/24

Exploitable With

Core Impact

Reference Information

CVE: CVE-2013-4353, CVE-2014-0160

BID: 64691, 66690

CERT: 720951

EDB-ID: 32745, 32764, 32791, 32998