OpenSSL ChangeCipherSpec June 9, 2014 at 8:27am EDT [codydumont] SC RESEARCH Confidential: The following report contains confidential information. Do not distribute, email, fax, or transfer via any electronic mechanism unless it has been approved by the recipient company's security policy. All copies and backups of this document should be saved on protected storage at all times. Do not share any of the information contained within this report with anyone unless they are authorized to view the information. Violating any of the previous instructions is grounds for termination. Table of Contents About this Report .................................................................................................................................................................................................. OpenSSL ChangeCipherSpec Summary .......................................................................................................................... OpenSSL ChangeCipherSpec Vulnerabilities OpenSSL Vulnerabilities 1 2 .......................................................................................................... 4 ........................................................................................................................................................................... 6 Table of Contents OpenSSL ChangeCipherSpec i About this Report As new threats emerge in networks, SecurityCenter customers are able to properly identify risk. This report identifies systems vulnerable to the new OpenSSL ChangeCipherSpec vulnerability. This report provides SecurityCenter customers with a good summary of the new vulnerabilities recently discovered within OpenSSL. There are six CVEs related to this new vulnerability. They are: CVE-2014-0224 - SSL/TLS MITM Vulnerability CVE-2014-0221 - DTLS recursion flaw CVE-2014-0195 - DTLS invalid fragment vulnerability CVE-2014-0198 - SSL_MODE_RELEASE_BUFFERS NULL pointer dereference CVE-2010-5298 - SSL_MODE_RELEASE_BUFFERS session injection CVE-2014-3470 - Anonymous ECDH Denial of Service This report contains three chapters which focus on the six CVEs related to the OpenSSL ChangeCipherSpec vulnerability and OpenSSL vulnerabilities alike. OpenSSL ChangeCipherSpec Summary: This chapter contains an executive level understanding of how vulnerable the systems have become. OpenSSL ChangeCipherSpec Vulnerabilities: This chapter contains a vulnerability iterator based on the six CVEs related to OpenSSL ChangeCipherSpec vulnerabilities. For each plugin associated with the CVEs, the vulnerability details and a list of affected systems is provided. OpenSSL Vulnerabilities: This chapter contains a vulnerability iterator based on the six CVEs related to OpenSSL vulnerabilities. For each plugin associated with the CVEs, the vulnerability details and a list of affected systems is provided. About this Report OpenSSL ChangeCipherSpec 1 OpenSSL ChangeCipherSpec Summary The OpenSSL ChangeCipherSpec Indicators matrix provides an overview of OpenSSL vulnerabilities and the related ChangeCipherSpec vulnerabilities. There are three columns, one for each vulnerability type (active, passive, event). Each column has an indicator for the six CVEs related to OpenSSL ChangeCipherSpec vulnerability, and one indicator for all OpenSSL related vulnerabilities. The active and passive indicators will turn red, signifying immediate action should be taken, while the event vulnerabilities are orange and signify that administrators should investigate the true severity of the event. OpenSSL ChangeCipherSpec Indicators Passive Detection Active Detection Event Detection ChangeCipherSpec Vulns ChangeCipherSpec Vulns ChangeCipherSpec Vulns OpenSSL Vulns OpenSSL Vulns OpenSSL Vulns The OpenSSL Vulnerability 7 Day Trends chart provides a 7 day trend analysis of systems with OpenSSL vulnerabilities, with a separate trend line for each plugin type. OpenSSL Vulnerability 7 Day Trends OpenSSL ChangeCipherSpec Summary OpenSSL ChangeCipherSpec 2 The OpenSSL ChangeCipherSpec Subnet Summary provides a chart showing the count per subnet of all the systems vulnerable to the six CVEs related to OpenSSL ChangeCipherSpec. OpenSSL ChangeCipherSpec Subnet Summary The ChangeCipherSpec Subnet Comparative Chart provides a comparative analysis showing the percentage of the each of the top ten vulnerable subnets. The pie chart is sorted on the total affected hosts per subnet. ChangeCipherSpec Subnet Comparative Chart OpenSSL ChangeCipherSpec Summary OpenSSL ChangeCipherSpec 3 OpenSSL ChangeCipherSpec Vulnerabilities This chapter contains a vulnerability iterator based on the six CVEs related to OpenSSL ChangeCipherSpec vulnerabilities. For each plugin associated with the CVEs, two tables are displayed. The first table provides all the vulnerability details, while the second provides a list of all the affected hosts, with the following details: IP address, MAC Address, DNS Name, and repository. Plugin: OpenSSL 'ChangeCipherSpec' MiTM Vulnerability (74326) Name: OpenSSL 'ChangeCipherSpec' MiTM Vulnerability Family: Misc. Vulnerability Details Plugin 74326 Plugin Name OpenSSL 'ChangeCipherSpec' MiTM Vulnerability Family Misc. Severity Exploit? Medium No Plugin Text: Synopsis: The remote host is affected by a vulnerability that could allow sensitive data to be decrypted. Description: The OpenSSL service on the remote host is vulnerable to a man-in-the-middle (MiTM) attack, based on its response to two consecutive 'ChangeCipherSpec' messages during the incorrect phase of an SSL/TLS handshake. This flaw could allow a MiTM attacker to decrypt or forge SSL messages by telling the service to begin encrypted communications before key material has been exchanged, which causes predictable keys to be used to secure future traffic. Solution: OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za. OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m. OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h. See Also: http://www.nessus.org/u?d5709faa https://www.imperialviolet.org/2014/06/05/earlyccs.html https://www.openssl.org/news/secadv_20140605.txt Risk Factor: Medium CVSS Base Score: 5.8 CVSS Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N CVSS Temporal Score: 5.0 CVSS Temporal Vector: CVSS2#E:ND/RL:OF/RC:C Plugin Output: The remote service accepted an SSL ChangeCipherSpec message at an incorrect point in the handshake leading to weak keys being used, and then attempted to decrypt an SSL record using those weak keys. CPE: cpe:/a:openssl:openssl OpenSSL ChangeCipherSpec Vulnerabilities OpenSSL ChangeCipherSpec 4 CVE: CVE-2010-5298, CVE-2014-0076, CVE-2014-0195, CVE-2014-0198, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470 BID: 66363, 66801, 67193, 67898, 67899, 67900, 67901 Crossref: OSVDB #104810, OSVDB #105763, OSVDB #106531, OSVDB #107729, OSVDB #107730, OSVDB #107731, OSVDB #107732, CERT #978508 Vulnerability Publication Date: 2014/06/05 Patch Publication Date: 2014/06/05 Plugin Publication Date: 2014/06/05 Plugin Modification Date: 2014/06/06 Exploit Available: false Exploitability Ease: No known exploits are available Plugin Type: remote Source File: openssl_ccs.nasl First Discovered: Jun 6, 2014 03:26:25 EDT Last Observed: Jun 9, 2014 06:21:18 EDT OpenSSL ChangeCipherSpec Vulnerabilities OpenSSL ChangeCipherSpec 5 OpenSSL Vulnerabilities This chapter contains a vulnerability iterator based on the all OpenSSL ChangeCipherSpec vulnerabilities. For each plugin associated with OpenSSL, two tables are displayed. The first table provides all the vulnerability details, while the second provides a list of all the affected hosts, with the following details: IP address, MAC Address, DNS Name, and repository. Plugin: OpenSSL 'ChangeCipherSpec' MiTM Vulnerability (74326) Name: OpenSSL 'ChangeCipherSpec' MiTM Vulnerability Family: Misc. Vulnerability Details Plugin 74326 Plugin Name OpenSSL 'ChangeCipherSpec' MiTM Vulnerability Family Misc. Severity Exploit? Medium No Plugin Text: Synopsis: The remote host is affected by a vulnerability that could allow sensitive data to be decrypted. Description: The OpenSSL service on the remote host is vulnerable to a man-in-the-middle (MiTM) attack, based on its response to two consecutive 'ChangeCipherSpec' messages during the incorrect phase of an SSL/TLS handshake. This flaw could allow a MiTM attacker to decrypt or forge SSL messages by telling the service to begin encrypted communications before key material has been exchanged, which causes predictable keys to be used to secure future traffic. Solution: OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za. OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m. OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h. See Also: http://www.nessus.org/u?d5709faa https://www.imperialviolet.org/2014/06/05/earlyccs.html https://www.openssl.org/news/secadv_20140605.txt Risk Factor: Medium CVSS Base Score: 5.8 CVSS Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N CVSS Temporal Score: 5.0 CVSS Temporal Vector: CVSS2#E:ND/RL:OF/RC:C Plugin Output: The remote service accepted an SSL ChangeCipherSpec message at an incorrect point in the handshake leading to weak keys being used, and then attempted to decrypt an SSL record using those weak keys. CPE: cpe:/a:openssl:openssl CVE: CVE-2010-5298, CVE-2014-0076, CVE-2014-0195, CVE-2014-0198, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470 BID: 66363, 66801, 67193, 67898, 67899, 67900, 67901 OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 6 Crossref: OSVDB #104810, OSVDB #105763, OSVDB #106531, OSVDB #107729, OSVDB #107730, OSVDB #107731, OSVDB #107732, CERT #978508 Vulnerability Publication Date: 2014/06/05 Patch Publication Date: 2014/06/05 Plugin Publication Date: 2014/06/05 Plugin Modification Date: 2014/06/06 Exploit Available: false Exploitability Ease: No known exploits are available Plugin Type: remote Source File: openssl_ccs.nasl First Discovered: Jun 6, 2014 03:26:25 EDT Last Observed: Jun 9, 2014 06:21:18 EDT Plugin: OpenSSL Heartbeat Information Disclosure (Heartbleed) (73412) Name: OpenSSL Heartbeat Information Disclosure (Heartbleed) Family: Misc. OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 7 Vulnerability Details Plugin 73412 Plugin Name OpenSSL Heartbeat Information Disclosure (Heartbleed) Family Misc. Severity Exploit? High Yes Plugin Text: Synopsis: The remote service is affected by an information disclosure vulnerability. Description: Based on its response to a TLS request with a specially crafted heartbeat message (RFC 6520), the remote service appears to be affected by an out-of-bounds read flaw. This flaw could allow a remote attacker to read the contents of up to 64KB of server memory, potentially exposing passwords, private keys, and other sensitive data. Solution: Upgrade to OpenSSL 1.0.1g or later. Alternatively, recompile OpenSSL with the '-DOPENSSL_NO_HEARTBEATS' flag to disable the vulnerable functionality. See Also: http://heartbleed.com/ http://eprint.iacr.org/2014/140 http://www.openssl.org/news/vulnerabilities.html#2014-0160 Risk Factor: High STIG Severity: I CVSS Base Score: 9.4 CVSS Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N CVSS Temporal Score: 8.2 CVSS Temporal Vector: CVSS2#E:ND/RL:OF/RC:C Plugin Output: Nessus was able to read the following memory from the remote service: 0x0000: 5F 70 47 00 01 88 00 A2 00 A3 00 AA 00 AB 00 9E _pG............. 0x0010: 00 9F 00 A4 00 A5 00 A0 00 A1 00 A6 00 A7 C0 2B ...............+ 0x0020: C0 2C C0 2F C0 30 C0 2D C0 2E C0 31 C0 32 00 A8 .,./.0.-...1.2.. 0x0030: 00 A9 00 AC 00 AD 00 9C 00 9D 00 63 00 65 00 11 ...........c.e.. 0x0040: 00 13 00 32 00 38 00 44 00 87 00 12 00 66 00 99 ...2.8.D.....f.. 0x0050: 00 8F 00 90 00 91 00 8E 00 14 00 16 00 33 00 39 .............3.9 0x0060: 00 45 00 88 00 15 00 9A 00 0B 00 0D 00 30 00 36 .E...........0.6 0x0070: 00 42 00 85 00 0C 00 97 00 0E 00 10 00 31 00 37 .B...........1.7 0x0080: 00 43 00 86 00 0F 00 98 00 19 00 17 00 1B 00 34 .C.............4 0x0090: 00 3A 00 46 00 89 00 1A 00 18 00 9B C0 08 C0 09 .:.F............ 0x00A0: C0 0A C0 06 C0 07 C0 12 C0 13 C0 14 C0 10 C0 11 ................ 0x00B0: C0 03 C0 04 C0 05 C0 01 C0 02 C0 0D C0 0E C0 0F ................ 0x00C0: C0 0B C0 0C C0 15 C0 17 C0 18 C0 19 C0 16 00 29 ...............) 0x00D0: 00 26 00 2A 00 27 00 2B 00 28 00 23 00 1F 00 22 .&.*.'.+.(.#..." 0x00E0: 00 1E 00 25 00 21 00 24 00 20 00 00 00 8B 00 8C ...%.!.$. ...... 0x00F0: 00 8D 00 8A 00 62 00 61 00 60 00 64 00 08 00 06 .....b.a.`.d.... 0x0100: 00 03 00 93 00 94 00 95 00 92 00 0A 00 2F 00 35 ............./.5 0x0110: 00 41 00 84 00 09 00 07 00 01 00 02 00 04 00 05 .A.............. 0x0120: 00 96 00 BD 00 C3 00 B2 00 B3 00 B4 00 B5 00 BE ................ 0x0130: 00 C4 00 BB 00 C1 00 BC 00 C2 00 BF 00 C5 C0 23 ...............# 0x0140: C0 24 C0 34 C0 35 C0 37 C0 36 C0 38 C0 39 C0 3A .$.4.5.7.6.8.9.: 0x0150: C0 3B C0 33 C0 27 C0 28 C0 25 C0 26 C0 29 C0 2A .;.3.'.(.%.&.).* 0x0160: 00 81 00 83 00 80 00 82 00 AE 00 AF 00 B0 00 B1 ................ 0x0170: 00 B6 00 B7 00 B8 00 B9 00 BA 00 C0 C0 1C C0 1F ................ 0x0180: C0 22 C0 1B C0 1E C0 21 C0 1A C0 1D C0 20 01 00 .".....!..... .. 0x0190: 00 05 00 0F 00 01 01 67 65 3A 20 65 6E 0D 0A 41 .......ge: en..A 0x01A0: 63 63 65 70 74 2D 43 68 61 72 73 65 74 3A 20 69 ccept-Charset: i 0x01B0: 73 6F 2D 38 38 35 39 2D 31 2C 2A 2C 75 74 66 2D so-8859-1,*,utf0x01C0: 38 0D 0A 0D 0A E5 A9 AD 8F 00 67 57 F4 AD 72 80 8.........gW..r. 0x01D0: 20 3A 5C D0 59 66 A0 C4 A9 03 03 03 03 41 41 41 :\.Yf.......AAA OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 8 0x01E0: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA * 0x0560: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 0D 0A AAAAAAAAAAAAAA.. 0x0570: 55 73 65 72 2D 41 67 65 6E 74 3A 20 4D 6F 7A 69 User-Agent: Mozi 0x0580: 6C 6C 61 2F 34 2E 30 20 28 63 6F 6D 70 61 74 69 lla/4.0 (compati 0x0590: 62 AA EC 16 B0 36 2D 82 04 C9 C4 50 00 47 7E 60 b....6-....P.G~` 0x05A0: 68 BB E0 36 03 07 07 07 07 07 07 07 07 00 00 00 h..6............ 0x05B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ * 0x1000: CPE: cpe:/a:openssl:openssl CVE: CVE-2014-0160 BID: 66690 Crossref: OSVDB #105465, CERT #720951, IAVA #2014-A-0051, EDB-ID #32745, EDB-ID #32764 Vulnerability Publication Date: 2014/02/24 Patch Publication Date: 2014/04/07 Plugin Publication Date: 2014/04/08 Plugin Modification Date: 2014/05/01 Exploit Available: true Exploitability Ease: Exploits are available Plugin Type: remote Source File: openssl_heartbleed.nasl First Discovered: Apr 10, 2014 03:32:11 EDT Last Observed: May 22, 2014 03:48:40 EDT Plugin: PHP 5.4.x < 5.4.23 OpenSSL openssl_x509_parse() Memory Corruption (71427) Vulnerability Details Plugin 71427 Plugin Name PHP 5.4.x < 5.4.23 OpenSSL Family CGI abuses Severity Exploit? Medium Yes OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 9 openssl_x509_parse() Memory Corruption Plugin Text: Synopsis: The remote web server uses a version of PHP that is potentially affected by a memory corruption vulnerability. Description: According to its banner, the version of PHP 5.4.x installed on the remote host is a version prior to 5.4.23. It is, therefore, potentially affected by a memory corruption flaw in the way the openssl_x509_parse() function of the PHP OpenSSL extension parsed X.509 certificates. A remote attacker could use this flaw to provide a malicious, self-signed certificate or a certificate signed by a trusted authority to a PHP application using the aforementioned function. This could cause the application to crash or possibly allow the attacker to execute arbitrary code with the privileges of the user running the PHP interpreter. Note that this plugin does not attempt to exploit the vulnerability, but instead relies only on PHP's self-reported version number. Solution: Upgrade to PHP version 5.4.23 or later. See Also: http://www.php.net/ChangeLog-5.php#5.4.23 http://seclists.org/fulldisclosure/2013/Dec/96 https://bugzilla.redhat.com/show_bug.cgi?id=1036830 Risk Factor: Medium CVSS Base Score: 6.8 CVSS Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P CVSS Temporal Score: 5.9 CVSS Temporal Vector: CVSS2#E:ND/RL:OF/RC:C Plugin Output: Version source : X-Powered-By: PHP/5.4.4-14+deb7u8 Installed version : 5.4.4-14+deb7u8 Fixed version : 5.4.23 CPE: cpe:/a:php:php CVE: CVE-2013-6420 BID: 64225 Crossref: OSVDB #100979, EDB-ID #30395 Vulnerability Publication Date: 2013/12/02 Patch Publication Date: 2013/12/12 Plugin Publication Date: 2013/12/14 Plugin Modification Date: 2013/12/19 Exploit Available: true Exploitability Ease: Exploits are available Plugin Type: remote Source File: php_5_4_23.nasl First Discovered: Mar 28, 2014 18:18:06 EDT Last Observed: May 19, 2014 07:07:18 EDT OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 10 Plugin: Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : openssl vulnerabilities (USN-1451-1) (59289) Name: Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : openssl vulnerabilities (USN-1451-1) Family: Ubuntu Local Security Checks Vulnerability Details Plugin 59289 Plugin Name Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : openssl vulnerabilities (USN-1451-1) Family Ubuntu Local Security Checks Severity Exploit? Medium No Plugin Text: Synopsis: The remote Ubuntu host is missing one or more security-related patches. Description: Ivan Nestlerode discovered that the Cryptographic Message Syntax (CMS) and PKCS #7 implementations in OpenSSL returned early if RSA decryption failed. This could allow an attacker to expose sensitive information via a Million Message Attack (MMA). (CVE-2012-0884) It was discovered that an integer underflow was possible when using TLS 1.1, TLS 1.2, or DTLS with CBC encryption. This could allow a remote attacker to cause a denial of service. (CVE-2012-2333). Solution: Update the affected libssl0.9.8, libssl1.0.0 and / or openssl packages. Risk Factor: Medium CVSS Base Score: 6.8 CVSS Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P CVSS Temporal Score: 5.9 CVSS Temporal Vector: CVSS2#E:ND/RL:OF/RC:C Plugin Output: - Installed package : libssl0.9.8_0.9.8o-5ubuntu1 Fixed package : libssl0.9.8_0.9.8o-5ubuntu1.7 - Installed package : openssl_0.9.8o-5ubuntu1 Fixed package : openssl_0.9.8o-5ubuntu1.7 CPE: p-cpe:/a:canonical:ubuntu_linux:libssl0.9.8 p-cpe:/a:canonical:ubuntu_linux:libssl1.0.0 p-cpe:/a:canonical:ubuntu_linux:openssl cpe:/o:canonical:ubuntu_linux:10.04:-:lts cpe:/o:canonical:ubuntu_linux:11.04 cpe:/o:canonical:ubuntu_linux:11.10 cpe:/o:canonical:ubuntu_linux:12.04:-:lts OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 11 cpe:/o:canonical:ubuntu_linux:8.04:-:lts CVE: CVE-2012-0884, CVE-2012-2333 BID: 52428, 53476 Crossref: OSVDB #80039, OSVDB #81810, USN #1451-1 Patch Publication Date: 2012/05/24 Plugin Publication Date: 2012/05/29 Plugin Modification Date: 2013/09/28 Exploit Available: false Exploitability Ease: No known exploits are available Plugin Type: local Source File: ubuntu_USN-1451-1.nasl First Discovered: Jun 4, 2014 22:25:05 EDT Last Observed: Jun 4, 2014 22:25:05 EDT Plugin: Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : openssl vulnerability (USN-1428-1) (58873) Name: Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : openssl vulnerability (USN-1428-1) Family: Ubuntu Local Security Checks Vulnerability Details Plugin 58873 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : Ubuntu Local Security Checks openssl vulnerability (USN-1428-1) Severity Exploit? High Yes Plugin Text: Synopsis: The remote Ubuntu host is missing one or more security-related patches. Description: It was discovered that the fix for CVE-2012-2110 was incomplete for OpenSSL 0.9.8. A remote attacker could trigger this flaw in services that used SSL to cause a denial of service or possibly execute arbitrary code with application privileges. Ubuntu 11.10 was not affected by this issue. (CVE-2012-2131) The original upstream fix for CVE-2012-2110 would cause BUF_MEM_grow_clean() to sometimes return the wrong error condition. This update fixes the problem. OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 12 Solution: Update the affected libssl0.9.8 and / or libssl1.0.0 packages. Risk Factor: High CVSS Base Score: 7.5 CVSS Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P CVSS Temporal Score: 5.9 CVSS Temporal Vector: CVSS2#E:POC/RL:OF/RC:C Plugin Output: - Installed package : libssl0.9.8_0.9.8o-5ubuntu1 Fixed package : libssl0.9.8_0.9.8o-5ubuntu1.5 CPE: p-cpe:/a:canonical:ubuntu_linux:libssl0.9.8 p-cpe:/a:canonical:ubuntu_linux:libssl1.0.0 cpe:/o:canonical:ubuntu_linux:10.04:-:lts cpe:/o:canonical:ubuntu_linux:11.04 cpe:/o:canonical:ubuntu_linux:11.10 cpe:/o:canonical:ubuntu_linux:8.04:-:lts CVE: CVE-2012-2110, CVE-2012-2131 BID: 53212 Crossref: OSVDB #81223, USN #1428-1 Patch Publication Date: 2012/04/24 Plugin Publication Date: 2012/04/25 Plugin Modification Date: 2013/05/25 Exploit Available: true Exploitability Ease: Exploits are available Plugin Type: local Source File: ubuntu_USN-1428-1.nasl First Discovered: Jun 4, 2014 22:25:05 EDT Last Observed: Jun 4, 2014 22:25:05 EDT Plugin: Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : openssl vulnerabilities (USN-1424-1) (58808) Name: Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : openssl vulnerabilities (USN-1424-1) OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 13 Family: Ubuntu Local Security Checks Vulnerability Details Plugin 58808 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : Ubuntu Local Security Checks openssl vulnerabilities (USN-1424-1) Severity Exploit? High Yes Plugin Text: Synopsis: The remote Ubuntu host is missing one or more security-related patches. Description: It was discovered that OpenSSL could be made to dereference a NULL pointer when processing S/MIME messages. A remote attacker could use this to cause a denial of service. These issues did not affect Ubuntu 8.04 LTS. (CVE-2006-7250, CVE-2012-1165) Tavis Ormandy discovered that OpenSSL did not properly perform bounds checking when processing DER data via BIO or FILE functions. A remote attacker could trigger this flaw in services that used SSL to cause a denial of service or possibly execute arbitrary code with application privileges. (CVE-2012-2110). Solution: Update the affected libssl0.9.8 and / or libssl1.0.0 packages. Risk Factor: High CVSS Base Score: 7.5 CVSS Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P CVSS Temporal Score: 5.9 CVSS Temporal Vector: CVSS2#E:POC/RL:OF/RC:C Plugin Output: - Installed package : libssl0.9.8_0.9.8o-5ubuntu1 Fixed package : libssl0.9.8_0.9.8o-5ubuntu1.4 CPE: p-cpe:/a:canonical:ubuntu_linux:libssl0.9.8 p-cpe:/a:canonical:ubuntu_linux:libssl1.0.0 cpe:/o:canonical:ubuntu_linux:10.04:-:lts cpe:/o:canonical:ubuntu_linux:11.04 cpe:/o:canonical:ubuntu_linux:11.10 cpe:/o:canonical:ubuntu_linux:8.04:-:lts CVE: CVE-2006-7250, CVE-2012-1165, CVE-2012-2110 BID: 52181, 52764, 53158 Crossref: OSVDB #79650, OSVDB #80040, OSVDB #81223, USN #1424-1 Patch Publication Date: 2012/04/19 Plugin Publication Date: 2012/04/20 Plugin Modification Date: 2013/05/25 Exploit Available: true Exploitability Ease: Exploits are available Plugin Type: local Source File: ubuntu_USN-1424-1.nasl OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 14 First Discovered: Jun 4, 2014 22:25:05 EDT Last Observed: Jun 4, 2014 22:25:05 EDT Plugin: Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : openssl vulnerabilities (USN-1357-1) (57887) Name: Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : openssl vulnerabilities (USN-1357-1) Family: Ubuntu Local Security Checks Vulnerability Details Plugin 57887 Plugin Name Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : openssl vulnerabilities (USN-1357-1) Family Ubuntu Local Security Checks Severity Exploit? High No Plugin Text: Synopsis: The remote Ubuntu host is missing one or more security-related patches. Description: It was discovered that the elliptic curve cryptography (ECC) subsystem in OpenSSL, when using the Elliptic Curve Digital Signature Algorithm (ECDSA) for the ECDHE_ECDSA cipher suite, did not properly implement curves over binary fields. This could allow an attacker to determine private keys via a timing attack. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1945) Adam Langley discovered that the ephemeral Elliptic Curve Diffie-Hellman (ECDH) functionality in OpenSSL did not ensure thread safety while processing handshake messages from clients. This could allow a remote attacker to cause a denial of service via out-of-order messages that violate the TLS protocol. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-3210) Nadhem Alfardan and Kenny Paterson discovered that the Datagram Transport Layer Security (DTLS) implementation in OpenSSL performed a MAC check only if certain padding is valid. This could allow a remote attacker to recover plaintext. (CVE-2011-4108) Antonio Martin discovered that a flaw existed in the fix to address CVE-2011-4108, the DTLS MAC check failure. This could allow a remote attacker to cause a denial of service. (CVE-2012-0050) Ben Laurie discovered a double free vulnerability in OpenSSL that could be triggered when the X509_V_FLAG_POLICY_CHECK flag is enabled. This could allow a remote attacker to cause a denial of service. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-4109) It was discovered that OpenSSL, in certain circumstances involving ECDH or ECDHE cipher suites, used an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves. This could allow a remote attacker to obtain the private key of a TLS server via multiple handshake attempts. This issue only affected Ubuntu 8.04 LTS. (CVE-2011-4354) Adam Langley discovered that the SSL 3.0 implementation in OpenSSL did not properly initialize data structures for block cipher padding. This could allow a remote attacker to obtain sensitive information. (CVE-2011-4576) OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 15 Andrew Chi discovered that OpenSSL, when RFC 3779 support is enabled, could trigger an assert when handling an X.509 certificate containing certificate-extension data associated with IP address blocks or Autonomous System (AS) identifiers. This could allow a remote attacker to cause a denial of service. (CVE-2011-4577) Adam Langley discovered that the Server Gated Cryptography (SGC) implementation in OpenSSL did not properly handle handshake restarts. This could allow a remote attacker to cause a denial of service. (CVE-2011-4619) Andrey Kulikov discovered that the GOST block cipher engine in OpenSSL did not properly handle invalid parameters. This could allow a remote attacker to cause a denial of service via crafted data from a TLS client. This issue only affected Ubuntu 11.10. (CVE-2012-0027). Solution: Update the affected libssl0.9.8, libssl1.0.0 and / or openssl packages. Risk Factor: High CVSS Base Score: 9.3 CVSS Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C CVSS Temporal Score: 6.9 CVSS Temporal Vector: CVSS2#E:U/RL:OF/RC:C Plugin Output: - Installed package : libssl0.9.8_0.9.8o-5ubuntu1 Fixed package : libssl0.9.8_0.9.8o-5ubuntu1.2 - Installed package : openssl_0.9.8o-5ubuntu1 Fixed package : openssl_0.9.8o-5ubuntu1.2 CPE: p-cpe:/a:canonical:ubuntu_linux:libssl0.9.8 p-cpe:/a:canonical:ubuntu_linux:libssl1.0.0 p-cpe:/a:canonical:ubuntu_linux:openssl cpe:/o:canonical:ubuntu_linux:10.04:-:lts cpe:/o:canonical:ubuntu_linux:10.10 cpe:/o:canonical:ubuntu_linux:11.04 cpe:/o:canonical:ubuntu_linux:11.10 cpe:/o:canonical:ubuntu_linux:8.04:-:lts CVE: CVE-2011-1945, CVE-2011-3210, CVE-2011-4108, CVE-2011-4109, CVE-2011-4354, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2012-0027, CVE-2012-0050 BID: 47888, 49471, 50882, 51281, 51563 Crossref: OSVDB #74632, OSVDB #75230, OSVDB #77650, OSVDB #78186, OSVDB #78187, OSVDB #78188, OSVDB #78189, OSVDB #78190, OSVDB #78191, OSVDB #78320, USN #1357-1 Patch Publication Date: 2012/02/09 Plugin Publication Date: 2012/02/10 Plugin Modification Date: 2013/05/25 Exploit Available: false Exploitability Ease: No known exploits are available Plugin Type: local Source File: ubuntu_USN-1357-1.nasl First Discovered: Jun 4, 2014 22:25:05 EDT Last Observed: Jun 4, 2014 22:25:05 EDT OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 16 Plugin: OpenSSL Version Detection (57323) Name: OpenSSL Version Detection Family: Web Servers Vulnerability Details Plugin 57323 Plugin Name OpenSSL Version Detection Family Web Servers Severity Exploit? Info No Plugin Text: Synopsis: The version of OpenSSL can be identified. Description: The version of OpenSSL could be extracted from the web server's banner. Note that in many cases, security patches are backported and the displayed version number does not show the patch level. Using it to identify vulnerable software is likely to lead to false detections. Solution: n/a See Also: http://www.openssl.org/ Risk Factor: None Plugin Output: Source : Server: Apache/1.3.33 (Unix) mod_ssl/2.8.22 OpenSSL/0.9.6m Version (from banner) : 0.9.6m CPE: cpe:/a:openssl:openssl Plugin Publication Date: 2011/12/16 Plugin Modification Date: 2011/12/16 Plugin Type: remote Source File: openssl_version.nasl First Discovered: Apr 9, 2014 10:41:23 EDT Last Observed: May 24, 2014 05:33:07 EDT OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 17 Plugin: OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG Ciphersuite Disabled Cipher Issue (51893) Name: OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG Ciphersuite Disabled Cipher Issue Family: General Vulnerability Details Plugin 51893 Plugin Name Family OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG General Ciphersuite Disabled Cipher Issue Severity Exploit? Medium No Plugin Text: Synopsis: The remote host allows the resumption of SSL sessions with a disabled cipher. Description: The version of OpenSSL on the remote host has been shown to allow the use of disabled ciphers when resuming a session. This means that an attacker that sees (e.g. by sniffing) the start of an SSL connection can manipulate the OpenSSL session cache to cause subsequent resumptions of that session to use a disabled cipher chosen by the attacker. Solution: Upgrade to OpenSSL 0.9.8j or later. Risk Factor: Medium CVSS Base Score: 4.3 CVSS Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N CVSS Temporal Score: 3.2 CVSS Temporal Vector: CVSS2#E:U/RL:OF/RC:C Plugin Output: The server allowed the following session over SSLv3 to be resumed as follows : Session ID : 34bb781d0f58f9aef93df835442aa96893fb80bcf101794c6ac225d025d45c8e Initial Cipher : TLS1_CK_RSA_WITH_AES_256_CBC_SHA (0x0035) Resumed Cipher : SSL3_CK_RSA_DES_40_CBC_SHA (0x0008) CPE: cpe:/a:openssl:openssl CVE: CVE-2008-7270 BID: 45254 Crossref: OSVDB #69655 Vulnerability Publication Date: 2010/12/02 Patch Publication Date: 2008/09/22 Plugin Publication Date: 2011/02/07 Plugin Modification Date: 2012/04/17 Exploit Available: false OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 18 Exploitability Ease: No known exploits are available Plugin Type: remote Source File: openssl_resume_disabled_cipher.nasl First Discovered: Apr 3, 2014 16:15:12 EDT Last Observed: May 22, 2014 03:48:40 EDT Plugin: OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG Session Resume Ciphersuite Downgrade Issue (51892) Name: OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG Session Resume Ciphersuite Downgrade Issue Family: General Vulnerability Details Plugin 51892 Plugin Name Family OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG Session Resume General Ciphersuite Downgrade Issue Severity Exploit? Medium No Plugin Text: Synopsis: The remote host allows resuming SSL sessions with a weaker cipher than the one originally negotiated. Description: The version of OpenSSL on the remote host has been shown to allow resuming session with a weaker cipher than was used when the session was initiated. This means that an attacker that sees (i.e., by sniffing) the start of an SSL connection can manipulate the OpenSSL session cache to cause subsequent resumptions of that session to use a weaker cipher chosen by the attacker. Note that other SSL implementations may also be affected by this vulnerability. Solution: Upgrade to OpenSSL 0.9.8q / 1.0.0.c or later, or contact your vendor for a patch. See Also: http://openssl.org/news/secadv_20101202.txt Risk Factor: Medium CVSS Base Score: 4.3 CVSS Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N CVSS Temporal Score: 3.7 CVSS Temporal Vector: CVSS2#E:ND/RL:OF/RC:C Plugin Output: OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 19 The server allowed the following session over SSLv3 to be resumed as follows : Session ID : 3b1d0489fd36812f1379e98e212931ef19c7ffd96e4333faefdbf9385aaccf01 Initial Cipher : TLS1_CK_RSA_WITH_AES_256_CBC_SHA (0x0035) Resumed Cipher : SSL3_CK_RSA_DES_64_CBC_SHA (0x0009) The server allowed the following session over TLSv1 to be resumed as follows : Session ID : 409fb25d132a9573e8d4eec7ef29291540af9aaa0ede3a42b1c915f4ab82a2de Initial Cipher : TLS1_CK_RSA_WITH_AES_256_CBC_SHA (0x0035) Resumed Cipher : TLS1_CK_RSA_WITH_DES_CBC_SHA (0x0009) CPE: cpe:/a:openssl:openssl CVE: CVE-2010-4180 BID: 45164 Crossref: OSVDB #69565 Vulnerability Publication Date: 2010/12/02 Patch Publication Date: 2010/12/02 Plugin Publication Date: 2011/02/07 Plugin Modification Date: 2014/01/27 Exploit Available: false Exploitability Ease: No known exploits are available Plugin Type: remote Source File: openssl_resume_different_cipher.nasl First Discovered: Apr 3, 2014 16:15:12 EDT Last Observed: May 22, 2014 03:48:40 EDT Plugin: OpenSSL Detection (50845) Name: OpenSSL Detection Family: Service detection OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 20 Vulnerability Details Plugin 50845 Plugin Name OpenSSL Detection Family Service detection Severity Exploit? Info No Plugin Text: Synopsis: The remote service appears to use OpenSSL to encrypt traffic. Description: Based on its response to a TLS request with a specially crafted server name extension, it seems that the remote service is using the OpenSSL library to encrypt traffic. Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS extensions (RFC 4366). Solution: n/a See Also: http://www.openssl.org Risk Factor: None CPE: cpe:/a:openssl:openssl Plugin Publication Date: 2010/11/30 Plugin Modification Date: 2013/10/18 Plugin Type: remote Source File: openssl_detect.nasl First Discovered: Apr 3, 2014 16:15:12 EDT Last Observed: May 22, 2014 03:48:40 EDT OpenSSL Vulnerabilities OpenSSL ChangeCipherSpec 21
© Copyright 2024 ExpyDoc