OpenSSL 1.1.0 < 1.1.0c Multiple Vulnerabilities

Medium Nessus Plugin ID 94963


A service running on the remote host is affected by multiple vulnerabilities.


According to its banner, the version of OpenSSL running on the remote host is 1.1.0 prior to 1.1.0c. It is, therefore, affected by multiple vulnerabilities :

- A NULL pointer deference flaw exists, specifically in the asn1_item_embed_d2i() function within file crypto/asn1/tasn_dec.c, when handling the ASN.1 CHOICE type, which results in a NULL value being passed to the structure callback if an attempt is made to free certain invalid encodings. An unauthenticated, remote attacker can exploit this to cause a denial of service condition.

- A heap overflow condition exists in the chacha20_poly1305_cipher() function within file crypto/evp/e_chacha20_poly1305.c when handling TLS connections using *-CHACHA20-POLY1305 cipher suites. An unauthenticated, remote attacker can exploit this to cause a denial of service condition. (CVE-2016-7054)

- A carry propagation error exists in the Broadwell-specific Montgomery multiplication procedure when handling input lengths divisible by but longer than 256 bits. This can result in transient authentication and key negotiation failures or reproducible erroneous outcomes of public-key operations with specially crafted input. An unauthenticated, remote attacker can possibly exploit this issue to compromise ECDH key negotiations that utilize Brainpool P-512 curves. (CVE-2016-7055)


Upgrade to OpenSSL version 1.1.0c or later.

See Also

Plugin Details

Severity: Medium

ID: 94963

File Name: openssl_1_1_0c.nasl

Version: $Revision: 1.7 $

Type: remote

Family: Web Servers

Published: 2016/11/18

Modified: 2017/07/20

Dependencies: 57323

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:ND


Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Required KB Items: openssl/port

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/11/10

Vulnerability Publication Date: 2016/11/10

Reference Information

CVE: CVE-2016-7053, CVE-2016-7054, CVE-2016-7055

BID: 94238, 94242, 94244

OSVDB: 147019, 147020, 147021