AIX OpenSSL Advisory : openssl_advisory8.doc

Medium Nessus Plugin ID 74468

Synopsis

The remote AIX host has a vulnerable version of OpenSSL.

Description

The version of OpenSSL installed on the remote host is potentially affected by a remote code execution or denial of service vulnerability.

A race condition exists in the ssl3_read_bytes function in s3_pkt.c in OpenSSL versions through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled. This could allow remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multi-threaded environment.

Solution

A fix is available, and can be downloaded from the AIX website.

To extract the fixes from the tar file :

zcat openssl-1.0.1.503.tar.Z | tar xvf -

IMPORTANT : If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding.

To preview the fix installation :

installp -apYd . openssl

To install the fix package :

installp -aXYd . openssl

See Also

http://aix.software.ibm.com/aix/efixes/security/openssl_advisory8.asc

https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp

Plugin Details

Severity: Medium

ID: 74468

File Name: aix_openssl_advisory8.nasl

Version: 1.9

Type: local

Published: 2014/06/11

Modified: 2018/06/29

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:ibm:aix, cpe:/a:openssl:openssl

Required KB Items: Host/AIX/lslpp, Host/local_checks_enabled, Host/AIX/version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/06/06

Vulnerability Publication Date: 2014/04/12

Reference Information

CVE: CVE-2010-5298

BID: 66801