AIX 6.1 TL 9 : bos.net.tcp.client (U861500)

high Nessus Plugin ID 87184

Synopsis

The remote AIX host is missing a vendor-supplied security patch.

Description

The remote host is missing AIX PTF U861500, which is related to the security of the package bos.net.tcp.client.

Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.

Network Time Protocol (NTP) Project NTP daemon (ntpd) is vulnerable to a denial of service, caused by an error when using symmetric key authentication. By sending specially crafted packets to both peering hosts, an attacker could exploit this vulnerability to prevent synchronization.

The TLS protocol could allow a remote attacker to obtain sensitive information, caused by the failure to properly convey a DHE_EXPORT ciphersuite choice. An attacker could exploit this vulnerability using man-in-the-middle techniques to force a downgrade to 512-bit export-grade cipher. Successful exploitation could allow an attacker to recover the session key as well as modify the contents of the traffic. This vulnerability is commonly referred to as 'Logjam'.

ISC BIND is vulnerable to a denial of service, caused by an error in the handling of TKEY queries. By sending specially crafted packets, a remote attacker could exploit this vulnerability to cause a REQUIRE assertion failure.

IBM AIX could allow a local attacker to escalate their privileges to root access through a vulnerability in netstat when a fiber channel adapter is present.

ISC BIND is vulnerable to a denial of service, caused by the exit of a validating resolver due to an assertion failure in buffer.c. By parsing a malformed DNSSEC key, a remote attacker could exploit this vulnerability to cause a denial of service.

Solution

Install the appropriate missing security-related fix.

See Also

http://www-01.ibm.com/support/docview.wss?uid=isg1IV73417

http://www-01.ibm.com/support/docview.wss?uid=isg1IV73783

http://www-01.ibm.com/support/docview.wss?uid=isg1IV74916

http://www-01.ibm.com/support/docview.wss?uid=isg1IV74920

http://www-01.ibm.com/support/docview.wss?uid=isg1IV75643

http://www-01.ibm.com/support/docview.wss?uid=isg1IV75692

http://www-01.ibm.com/support/docview.wss?uid=isg1IV75940

http://www-01.ibm.com/support/docview.wss?uid=isg1IV78091

Plugin Details

Severity: High

ID: 87184

File Name: aix_U861500.nasl

Version: 2.5

Type: local

Published: 12/4/2015

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:ibm:aix:6.1

Required KB Items: Host/local_checks_enabled, Host/AIX/oslevel, Host/AIX/version, Host/AIX/lslpp

Patch Publication Date: 5/20/2015

Vulnerability Publication Date: 5/20/2015

Reference Information

CVE: CVE-2015-4948, CVE-2015-5722