OpenSSL < 0.9.8h Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 4521


The remote host is vulnerable to multiple attack vectors.


Versions of OpenSSL earlier than 0.9.8h are potentially affected by multiple vulnerabilities :

- A double-free error exists related to the handling of server name extension data and specially crafted TLS 1.0 'Client Hello' packets. This can cause application crashes. Note that successful exploitation requires that OpenSSL is compiled with the TLS server name extensions. (CVE-2008-0891)

- A NULL pointer dereference error exists related to anonymous Diffie-Hellman key exchange and TLS handshakes. This can be exploited by omitting the 'Server Key exchange message' from the handshake and can cause application crashes. (CVE-2008-1672)

- On 32-bit builds, an information disclosure vulnerability exists during certain calculations for NIST elliptic curves P-256 or P-384. This error can allow an attacker to recover the private key of the TLS server.

The following are required for exploitation :

- 32-bit build

- Use of elliptic curves P-256 and/or P-384

- Either the use of ECDH family ciphers and/or the use of ECDHE family ciphers without the SSL_OP_SINGLE_ECDH_USE context option. (CVE-2011-4354)


Upgrade to version 0.9.8h or later.

See Also

Plugin Details

Severity: Medium

ID: 4521

Family: Web Servers

Published: 2011/12/02

Updated: 2019/03/06

Dependencies: 5563

Nessus ID: 56996

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Patch Publication Date: 2008/05/28

Vulnerability Publication Date: 2008/05/28

Reference Information

CVE: CVE-2008-0891, CVE-2008-1672, CVE-2008-4534

BID: 29405, 50882