OpenSSL < 0.9.8r / 1.0.0d OCSP Stapling DoS
Medium Nessus Network Monitor Plugin ID 5782
SynopsisThe remote web server is vulnerable to multiple attack vectors.
DescriptionVersions of OpenSSL earlier than 0.9.8r and 1.0.0d are potentially affected by a vulnerability wherein an incorrectly formatted ClientHello handshake message could cause OpenSSL to parse past the end of the message which could cause the web server to crash. There is also the potential for information disclosure if OCSP nonce extensions are used.
SolutionUpgrade to OpenSSL 0.9.8r, 1.0.0d, or later.