AIX OpenSSL Advisory : openssl_advisory16.asc (SLOTH)

Medium Nessus Plugin ID 88591

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 3.6

Synopsis

The remote AIX host has a version of OpenSSL installed that is affected by a collision-based forgery vulnerability.

Description

The remote AIX host has a version of OpenSSL installed that is affected by a collision-based forgery vulnerability, known as SLOTH (Security Losses from Obsolete and Truncated Transcript Hashes), in the TLS protocol due to accepting RSA-MD5 signatures in the server signature within the TLS 1.2 ServerKeyExchange messages during a TLS handshake. A man-in-the-middle attacker can exploit this, via a transcript collision attack, to impersonate a TLS server.

Solution

A fix is available and can be downloaded from the IBM AIX website.

See Also

http://aix.software.ibm.com/aix/efixes/security/openssl_advisory16.asc

http://www.mitls.org/downloads/transcript-collisions.pdf

http://www.mitls.org/pages/attacks/SLOTH

Plugin Details

Severity: Medium

ID: 88591

File Name: aix_openssl_advisory16.nasl

Version: 1.7

Type: local

Published: 2016/02/05

Updated: 2018/07/17

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 3.6

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:ibm:aix, cpe:/a:openssl:openssl

Required KB Items: Host/AIX/lslpp, Host/local_checks_enabled, Host/AIX/version

Patch Publication Date: 2016/01/29

Vulnerability Publication Date: 2015/12/24

Reference Information

CVE: CVE-2015-7575

BID: 79684