AIX OpenSSL Advisory : openssl_advisory8.doc

medium Nessus Plugin ID 74468


The remote AIX host has a vulnerable version of OpenSSL.


The version of OpenSSL installed on the remote host is potentially affected by a remote code execution or denial of service vulnerability.

A race condition exists in the ssl3_read_bytes function in s3_pkt.c in OpenSSL versions through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled. This could allow remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multi-threaded environment.


A fix is available, and can be downloaded from the AIX website.

To extract the fixes from the tar file :

zcat openssl- | tar xvf -

IMPORTANT : If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding.

To preview the fix installation :

installp -apYd . openssl

To install the fix package :

installp -aXYd . openssl

See Also

Plugin Details

Severity: Medium

ID: 74468

File Name: aix_openssl_advisory8.nasl

Version: 1.11

Type: local

Published: 6/11/2014

Updated: 1/4/2021

Risk Information


Risk Factor: Medium

Score: 6


Risk Factor: Medium

Base Score: 4

Temporal Score: 3.5

Vector: AV:N/AC:H/Au:N/C:N/I:P/A:P

Temporal Vector: E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:ibm:aix, cpe:/a:openssl:openssl

Required KB Items: Host/AIX/lslpp, Host/local_checks_enabled, Host/AIX/version

Exploit Ease: No known exploits are available

Patch Publication Date: 6/6/2014

Vulnerability Publication Date: 4/12/2014

Reference Information

CVE: CVE-2010-5298

BID: 66801