AIX OpenSSL Advisory : openssl_advisory8.doc

medium Nessus Plugin ID 74468


The remote AIX host has a vulnerable version of OpenSSL.


The version of OpenSSL installed on the remote host is potentially affected by a remote code execution or denial of service vulnerability.

A race condition exists in the ssl3_read_bytes function in s3_pkt.c in OpenSSL versions through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled. This could allow remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multi-threaded environment.


A fix is available, and can be downloaded from the AIX website.

To extract the fixes from the tar file :

zcat openssl- | tar xvf -

IMPORTANT : If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding.

To preview the fix installation :

installp -apYd . openssl

To install the fix package :

installp -aXYd . openssl

See Also

Plugin Details

Severity: Medium

ID: 74468

File Name: aix_openssl_advisory8.nasl

Version: 1.12

Type: local

Published: 6/11/2014

Updated: 4/21/2023

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Medium

Base Score: 4

Temporal Score: 3.5

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: cpe:/o:ibm:aix, cpe:/a:openssl:openssl

Required KB Items: Host/local_checks_enabled, Host/AIX/version, Host/AIX/lslpp

Exploit Ease: No known exploits are available

Patch Publication Date: 6/6/2014

Vulnerability Publication Date: 4/12/2014

Reference Information

CVE: CVE-2010-5298

BID: 66801