AIX OpenSSL Advisory : openssl_advisory17.asc (Logjam)

Medium Nessus Plugin ID 89829

Synopsis

The remote AIX host has a version of OpenSSL installed that is affected by multiple vulnerabilities.

Description

The version of OpenSSL installed on the remote AIX host is affected by the following vulnerabilities :

- A cipher algorithm downgrade vulnerability exists due to a flaw that is triggered when handling cipher negotiation. A remote attacker can exploit this to negotiate SSLv2 ciphers and complete SSLv2 handshakes even if all SSLv2 ciphers have been disabled on the server. Note that this vulnerability only exists if the SSL_OP_NO_SSLv2 option has not been disabled.
(CVE-2015-3197)

- A man-in-the-middle vulnerability, known as Logjam, exists due to a flaw in the SSL/TLS protocol. A remote attacker can exploit this flaw to downgrade connections using ephemeral Diffie-Hellman key exchange to 512-bit export-grade cryptography. (CVE-2015-4000)

Solution

A fix is available and can be downloaded from the IBM AIX website.

See Also

http://aix.software.ibm.com/aix/efixes/security/openssl_advisory17.asc

https://weakdh.org/

Plugin Details

Severity: Medium

ID: 89829

File Name: aix_openssl_advisory17.nasl

Version: 1.9

Type: local

Published: 2016/03/10

Modified: 2018/07/17

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:ibm:aix, cpe:/a:openssl:openssl

Required KB Items: Host/AIX/lslpp, Host/local_checks_enabled, Host/AIX/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/03/02

Vulnerability Publication Date: 2015/05/20

Reference Information

CVE: CVE-2015-3197, CVE-2015-4000

BID: 74733, 82237

CERT: 257823