AIX OpenSSL Advisory : openssl_advisory7.doc (Heartbleed)

high Nessus Plugin ID 73472

Synopsis

The remote AIX host is running a vulnerable version of OpenSSL.

Description

The version of OpenSSL running on the remote host is affected by an information disclosure vulnerability.

OpenSSL incorrectly handles memory in the TLS heartbeat extension, potentially allowing a remote attacker to read the contents of up to 64KB of server memory, potentially exposing passwords, private keys, and other sensitive data.

Solution

Install the appropriate interim fix. Additionally, to address this issue you must :

- Replace your SSL certificates by revoking existing certificates and reissuing new certificates, with a new private key generated by 'openssl genrsa'.

- Reset User Credentials Force users to reset their passwords and revoke any existing cookies or authentication prior to the re-authentication.

See Also

https://aix.software.ibm.com/aix/efixes/security/openssl_advisory7.doc

http://heartbleed.com/

http://eprint.iacr.org/2014/140

http://www.openssl.org/news/vulnerabilities.html#2014-0160

Plugin Details

Severity: High

ID: 73472

File Name: aix_openssl_advisory7.nasl

Version: 1.13

Type: local

Published: 4/11/2014

Updated: 4/21/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.1

CVSS v2

Risk Factor: High

Base Score: 9.4

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N

Vulnerability Information

CPE: cpe:/a:openssl:openssl, cpe:/o:ibm:aix

Required KB Items: Host/AIX/lslpp, Host/local_checks_enabled, Host/AIX/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/10/2014

Vulnerability Publication Date: 4/7/2014

CISA Known Exploited Vulnerability Due Dates: 5/25/2022

Exploitable With

Core Impact

Reference Information

CVE: CVE-2014-0160

BID: 66690

CERT: 720951