FreeBSD : mbedTLS/PolarSSL -- SLOTH attack on TLS 1.2 server authentication (4084168e-b531-11e5-a98c-0011d823eebd)

high Nessus Plugin ID 87789

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

ARM Limited reports :

MD5 handshake signatures in TLS 1.2 are vulnerable to the SLOTH attack on TLS 1.2 server authentication. They have been disabled by default.
Other attacks from the SLOTH paper do not apply to any version of mbed TLS or PolarSSL.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?bea4a1c7

http://www.nessus.org/u?9bc01db4

Plugin Details

Severity: High

ID: 87789

File Name: freebsd_pkg_4084168eb53111e5a98c0011d823eebd.nasl

Version: 2.3

Type: local

Published: 1/8/2016

Updated: 1/4/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:mbedtls, p-cpe:/a:freebsd:freebsd:polarssl13, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 1/7/2016

Vulnerability Publication Date: 1/4/2016