AIX OpenSSL Advisory : ssl_advisory.asc

medium Nessus Plugin ID 73566

Synopsis

The remote AIX host is running a vulnerable version of OpenSSL.

Description

The version of OpenSSL running on the remote host is affected by the following vulnerabilities :

- A vulnerability in the way SSL and TLS protocols allow renegotiation requests may allow an attacker to inject plaintext into an application protocol stream. This could result in a situation where the attacker may be able to issue commands to the server that appear to be coming from a legitimate source.

- A remote, unauthenticated attacker may be able to inject an arbitrary amount of chosen plaintext into the beginning of the application protocol stream. This could allow an attacker to issue HTTP requests or take action impersonating the user, among other consequences.

Please note that the recommended fixes will disable all session renegotiation.

Solution

A fix is available, and it can be downloaded from the AIX website.

To extract the fixes from the tar file :

zcat openssl.0.9.8.1102.tar.Z | tar xvf - or zcat openssl-fips.12.9.8.1102.tar.Z | tar xvf - or zcat openssl.0.9.8.805.tar.Z | tar xvf -

IMPORTANT : If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding.

To preview the fix installation :

installp -apYd . openssl

To install the fix package :

installp -aXYd . openssl

See Also

https://aix.software.ibm.com/aix/efixes/security/ssl_advisory.asc

https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp

Plugin Details

Severity: Medium

ID: 73566

File Name: aix_ssl_advisory.nasl

Version: 1.7

Type: local

Published: 4/16/2014

Updated: 4/21/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: cpe:/o:ibm:aix

Required KB Items: Host/AIX/lslpp, Host/local_checks_enabled, Host/AIX/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/13/2010

Vulnerability Publication Date: 11/4/2009

Reference Information

CVE: CVE-2009-3555

BID: 36935

CWE: 310

CERT: 120541