Synopsis
The remote service is affected by multiple vulnerabilities.
Description
The version of OpenSSL installed on the remote host is prior to 1.0.1k. It is, therefore, affected by multiple vulnerabilities as referenced in the 1.0.1k advisory.
  - Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1     before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many     duplicate records for the next epoch, leading to failure of replay detection. (CVE-2015-0206)
  - The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k     accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify     message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS     Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
    (CVE-2015-0205)
  - The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not     properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat     cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl,     crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c. (CVE-2014-3570)
  - The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1     before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate     brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the FREAK     issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated     with servers or other TLS implementations. (CVE-2015-0204)
  - OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints     on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist     protection mechanism by including crafted data within a certificate's unsigned portion, related to     crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
    (CVE-2014-8275)
  - The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1     before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of     forward secrecy by omitting the ServerKeyExchange message. (CVE-2014-3572)
  - OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a     denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is     processed with a different read operation for the handshake header than for the handshake body, related to     the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c. (CVE-2014-3571)
  - The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly     handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service     (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3     handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the     CVE-2014-3568 fix. (CVE-2014-3569)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade to OpenSSL version 1.0.1k or later.
Plugin Details
File Name: openssl_1_0_1k.nasl
Agent: windows, macosx, unix
Configuration: Enable thorough checks (optional)
Supported Sensors: Nessus Agent, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: cpe:/a:openssl:openssl
Required KB Items: installed_sw/OpenSSL
Exploit Ease: No known exploits are available
Patch Publication Date: 1/8/2015
Vulnerability Publication Date: 10/21/2014
Reference Information
CVE: CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE-2015-0206
BID: 71934, 71935, 71936, 71937, 71939, 71940, 71941, 71942