SynopsisThe remote web server contains an application that is affected by multiple OpenSSL-related vulnerabilities.
DescriptionAccording to its version number, the Splunk Web hosted on the remote web server is 6.x prior to 6.0.3. It is, therefore, affected by multiple OpenSSL-related vulnerabilities :
- A flaw exists with the OpenSSL version being used by Splunk with the 'ssl3_take_mac' in 'ssl/s3_both.c'. This allows a remote attacker to cause a denial of service with a specially crafted request. (CVE-2013-4353)
- An out-of-bounds read error, known as Heartbleed, exists in the TLS/DTLS implementation due to improper handling of TLS heartbeat extension packets. A remote attacker, using crafted packets, can trigger a buffer over-read, resulting in the disclosure of up to 64KB of process memory, which contains sensitive information such as primary key material, secondary key material, and other protected content. (CVE-2014-0160)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
SolutionUpgrade to Splunk 6.0.3 or later.