OpenSSL < 0.9.8q / 1.0.0c Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 5720

Synopsis

The remote web server is vulnerable to multiple attack vectors.

Description

Versions of OpenSSL earlier than 0.9.8q and 1.0.0c are potentially affected by multiple vulnerabilities :

- It may be possible to downgrade the ciphersuite to a weaker version by modifying the stored session cache cipher suite.

- An error exists in the J-PAKE implementation which could lead to successful validation by someone with no knowledge of the shared secret.

Solution

Upgrade to OpenSSL 0.9.8q, 1.0.0c, or later.

See Also

http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf

http://www.openssl.org/news/secadv_20101202.txt

Plugin Details

Severity: Medium

ID: 5720

Family: Web Servers

Published: 12/7/2010

Updated: 3/6/2019

Nessus ID: 51058, 51892

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Patch Publication Date: 12/2/2010

Vulnerability Publication Date: 12/2/2010

Reference Information

CVE: CVE-2010-4180, CVE-2010-4252

BID: 45163, 45164