OpenSSL < 0.9.6m / 0.9.7d Denial of Service

medium Nessus Plugin ID 17750

Synopsis

The remote server is vulnerable to a denial of service attack.

Description

According to its banner, the remote server is running a version of OpenSSL that is earlier than 0.9.6m or 0.9.7d.

A remote attacker can crash the server by sending an overly long Kerberos ticket or a crafted SSL/TLS handshake.

Solution

Upgrade to OpenSSL 0.9.6m / 0.9.7d or later.

See Also

https://www.us-cert.gov/ncas/alerts/ta04-078a

https://www.openssl.org/news/secadv/20040317.txt

http://marc.info/?l=bugtraq&m=107953412903636&w=2

Plugin Details

Severity: Medium

ID: 17750

File Name: openssl_0_9_6m_0_9_7d.nasl

Version: 1.11

Type: remote

Family: Web Servers

Published: 1/4/2012

Updated: 10/7/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Required KB Items: openssl/port

Exploit Ease: No known exploits are available

Patch Publication Date: 3/17/2004

Vulnerability Publication Date: 3/17/2004

Reference Information

CVE: CVE-2004-0079, CVE-2004-0112

BID: 9899

CERT: 484726