AIX OpenSSL Advisory : openssl_advisory9.doc

Medium Nessus Plugin ID 74512


The remote AIX host has a version of OpenSSL installed that is potentially affected by multiple vulnerabilities.


The version of OpenSSL installed on the remote host is potentially affected by the following remote code execution and denial of service vulnerabilities :

- OpenSSL could allow an attacker to cause a buffer overrun situation when an attacker sends invalid DTLS fragments to an OpenSSL DTLS client or server, which forces it to run arbitrary code on a vulnerable client or server. (CVE-2014-0195)

- An attacker could cause a denial of service by exploiting a flaw in the do_ssl3_write function via a NULL pointer dereference. NOTE: Only versions through are vulnerable. (CVE-2014-0198)

- An attacker could cause a denial of service by sending an invalid DTLS handshake to an OpenSSL DTLS client, resulting in recursive execution of code and an eventual crash. (CVE-2014-0221)

- An attacker could use a man-in-the-middle (MITM) attack to force the use of weak keying material in OpenSSL SSL/TLS clients and servers. The attacker could decrypt and modify traffic from the attacked client and server.
The attack can only be performed between a vulnerable client and server. (CVE-2014-0224)

- An attacker could cause a denial of service by exploiting OpenSSL's anonymous ECDH cipher suites present within OpenSSL clients. (CVE-2014-3470)


A fix is available and can be downloaded from the AIX website.

To extract the fixes from the tar file :

- For OpenSSL 1.0.1 version :
zcat openssl- | tar xvf -

- For OpenSSL 0.9.8 version :
zcat openssl- | tar xvf -

- For OpenSSL 12.9.8 version :
zcat openssl- | tar xvf

IMPORTANT : If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding.

To preview the fix installation :

installp -apYd . openssl

To install the fix package :

installp -aXYd . openssl

See Also

Plugin Details

Severity: Medium

ID: 74512

File Name: aix_openssl_advisory9.nasl

Version: 1.16

Type: local

Published: 2014/06/13

Updated: 2018/11/28

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:ibm:aix, cpe:/a:openssl:openssl

Required KB Items: Host/AIX/lslpp, Host/local_checks_enabled, Host/AIX/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/06/11

Vulnerability Publication Date: 2014/04/12

Exploitable With

Core Impact

Reference Information

CVE: CVE-2014-0195, CVE-2014-0198, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470

BID: 67193, 67898, 67899, 67900, 67901

CERT: 978508