Vulnerabilities > CVE-2010-0742 - Cryptographic Issues vulnerability in Openssl

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
openssl
CWE-310
nessus

Summary

The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-9421.NASL
    descriptionFix for an important security vulnerability CVE-2010-0742. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47534
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/47534
    titleFedora 11 : openssl-0.9.8n-2.fc11 (2010-9421)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2010-9421.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(47534);
      script_version("1.14");
      script_cvs_date("Date: 2019/08/02 13:32:33");
    
      script_cve_id("CVE-2010-0742");
      script_bugtraq_id(31692, 35001, 35138, 38533, 38562, 39013, 40502);
      script_xref(name:"FEDORA", value:"2010-9421");
    
      script_name(english:"Fedora 11 : openssl-0.9.8n-2.fc11 (2010-9421)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Fix for an important security vulnerability CVE-2010-0742.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=598738"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2010-June/043193.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?65b43e29"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected openssl package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:openssl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:11");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2010/06/02");
      script_set_attribute(attribute:"plugin_publication_date", value:"2010/07/01");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2010-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^11([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 11.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC11", reference:"openssl-0.9.8n-2.fc11")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openssl");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-9639.NASL
    descriptionMinor update from upstream fixing two security vulnerabilities - CVE-2010-0742 and CVE-2010-1633. It is fully ABI compatible with openssl-1.0.0. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47546
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/47546
    titleFedora 12 : openssl-1.0.0a-1.fc12 (2010-9639)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2010-9639.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(47546);
      script_version("1.14");
      script_cvs_date("Date: 2019/08/02 13:32:33");
    
      script_cve_id("CVE-2010-0742", "CVE-2010-1633");
      script_bugtraq_id(40502, 40503);
      script_xref(name:"FEDORA", value:"2010-9639");
    
      script_name(english:"Fedora 12 : openssl-1.0.0a-1.fc12 (2010-9639)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Minor update from upstream fixing two security vulnerabilities -
    CVE-2010-0742 and CVE-2010-1633. It is fully ABI compatible with
    openssl-1.0.0.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=598732"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=598738"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2010-June/042919.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?bb56823c"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected openssl package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:openssl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:12");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2010/06/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2010/07/01");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^12([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 12.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC12", reference:"openssl-1.0.0a-1.fc12")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openssl");
    }
    
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1547.NASL
    descriptionAccording to the versions of the openssl packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - A NULL pointer dereference flaw was found in OpenSSL
    last seen2020-06-01
    modified2020-06-02
    plugin id125000
    published2019-05-14
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125000
    titleEulerOS Virtualization 3.0.1.0 : openssl (EulerOS-SA-2019-1547)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(125000);
      script_version("1.4");
      script_cvs_date("Date: 2020/01/17");
    
      script_cve_id(
        "CVE-2007-3108",
        "CVE-2007-4995",
        "CVE-2008-5077",
        "CVE-2009-1378",
        "CVE-2009-1387",
        "CVE-2009-3245",
        "CVE-2009-3555",
        "CVE-2010-0742",
        "CVE-2010-4180",
        "CVE-2010-5298",
        "CVE-2013-0169",
        "CVE-2014-0195",
        "CVE-2014-0221",
        "CVE-2014-3505",
        "CVE-2014-3567",
        "CVE-2014-3572",
        "CVE-2015-0288",
        "CVE-2015-0292",
        "CVE-2015-1790",
        "CVE-2017-3736"
      );
      script_bugtraq_id(
        33150,
        35001,
        35417,
        36935,
        38562,
        40502,
        45164,
        57778,
        66801,
        67900,
        67901,
        69081,
        70586,
        71942,
        73196,
        73228,
        73237,
        75157
      );
    
      script_name(english:"EulerOS Virtualization 3.0.1.0 : openssl (EulerOS-SA-2019-1547)");
      script_summary(english:"Checks the rpm output for the updated packages.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote EulerOS Virtualization host is missing multiple security
    updates.");
      script_set_attribute(attribute:"description", value:
    "According to the versions of the openssl packages installed, the
    EulerOS Virtualization installation on the remote host is affected by
    the following vulnerabilities :
    
      - A NULL pointer dereference flaw was found in OpenSSL's
        X.509 certificate handling implementation. A specially
        crafted X.509 certificate could cause an application
        using OpenSSL to crash if the application attempted to
        convert the certificate to a certificate
        request.(CVE-2015-0288)
    
      - Off-by-one error in the DTLS implementation in OpenSSL
        0.9.8 before 0.9.8f allows remote attackers to execute
        arbitrary code via unspecified vectors.(CVE-2007-4995)
    
      - An integer underflow flaw, leading to a buffer
        overflow, was found in the way OpenSSL decoded
        malformed Base64-encoded inputs. An attacker able to
        make an application using OpenSSL decode a specially
        crafted Base64-encoded input (such as a PEM file) could
        use this flaw to cause the application to crash. Note:
        this flaw is not exploitable via the TLS/SSL protocol
        because the data being transferred is not
        Base64-encoded.(CVE-2015-0292)
    
      - OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when
        SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled,
        does not properly prevent modification of the
        ciphersuite in the session cache, which allows remote
        attackers to force the downgrade to an unintended
        cipher via vectors involving sniffing network traffic
        to discover a session identifier.(CVE-2010-4180)
    
      - OpenSSL before 0.9.8m does not check for a NULL return
        value from bn_wexpand function calls in (1)
        crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3)
        crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which
        has unspecified impact and context-dependent attack
        vectors.(CVE-2009-3245)
    
      - The Cryptographic Message Syntax (CMS) implementation
        in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and
        1.x before 1.0.0a does not properly handle structures
        that contain OriginatorInfo, which allows
        context-dependent attackers to modify invalid memory
        locations or conduct double-free attacks, and possibly
        execute arbitrary code, via unspecified
        vectors.(CVE-2010-0742)
    
      - Race condition in the ssl3_read_bytes function in
        s3_pkt.c in OpenSSL through 1.0.1g, when
        SSL_MODE_RELEASE_BUFFERS is enabled, allows remote
        attackers to inject data across sessions or cause a
        denial of service (use-after-free and parsing error)
        via an SSL connection in a multithreaded
        environment.(CVE-2010-5298)
    
      - The BN_from_montgomery function in crypto/bn/bn_mont.c
        in OpenSSL 0.9.8e and earlier does not properly perform
        Montgomery multiplication, which might allow local
        users to conduct a side-channel attack and retrieve RSA
        private keys.(CVE-2007-3108)
    
      - A memory leak flaw was found in the way an OpenSSL
        handled failed session ticket integrity checks. A
        remote attacker could exhaust all available memory of
        an SSL/TLS or DTLS server by sending a large number of
        invalid session tickets to that server.(CVE-2014-3567)
    
      - It was discovered that OpenSSL would perform an ECDH
        key exchange with a non-ephemeral key even when the
        ephemeral ECDH cipher suite was selected. A malicious
        server could make a TLS/SSL client using OpenSSL use a
        weaker key exchange method than the one requested by
        the user.(CVE-2014-3572)
    
      - A denial of service flaw was found in the way OpenSSL
        handled certain DTLS ServerHello requests. A specially
        crafted DTLS handshake packet could cause a DTLS client
        using OpenSSL to crash.(CVE-2014-0221)
    
      - A NULL pointer dereference was found in the way OpenSSL
        handled certain PKCS#7 inputs. An attacker able to make
        an application using OpenSSL verify, decrypt, or parse
        a specially crafted PKCS#7 input could cause that
        application to crash. TLS/SSL clients and servers using
        OpenSSL were not affected by this flaw.(CVE-2015-1790)
    
      - The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0
        and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and
        other products, do not properly consider timing
        side-channel attacks on a MAC check requirement during
        the processing of malformed CBC padding, which allows
        remote attackers to conduct distinguishing attacks and
        plaintext-recovery attacks via statistical analysis of
        timing data for crafted packets, aka the 'Lucky
        Thirteen' issue.(CVE-2013-0169)
    
      - OpenSSL 0.9.8i and earlier does not properly check the
        return value from the EVP_VerifyFinal function, which
        allows remote attackers to bypass validation of the
        certificate chain via a malformed SSL/TLS signature for
        DSA and ECDSA keys.(CVE-2008-5077)
    
      - The TLS protocol, and the SSL protocol 3.0 and possibly
        earlier, as used in Microsoft Internet Information
        Services (IIS) 7.0, mod_ssl in the Apache HTTP Server
        2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5
        and earlier, Mozilla Network Security Services (NSS)
        3.12.4 and earlier, multiple Cisco products, and other
        products, does not properly associate renegotiation
        handshakes with an existing connection, which allows
        man-in-the-middle attackers to insert data into HTTPS
        sessions, and possibly other types of sessions
        protected by TLS or SSL, by sending an unauthenticated
        request that is processed retroactively by a server in
        a post-renegotiation context, related to a 'plaintext
        injection' attack, aka the 'Project Mogul'
        issue.(CVE-2009-3555)
    
      - Multiple memory leaks in the
        dtls1_process_out_of_seq_message function in
        ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8
        versions allow remote attackers to cause a denial of
        service (memory consumption) via DTLS records that (1)
        are duplicates or (2) have sequence numbers much
        greater than current sequence numbers, aka 'DTLS
        fragment handling memory leak.'(CVE-2009-1378)
    
      - The dtls1_retrieve_buffered_fragment function in
        ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows
        remote attackers to cause a denial of service (NULL
        pointer dereference and daemon crash) via an
        out-of-sequence DTLS handshake message, related to a
        'fragment bug.'(CVE-2009-1387)
    
      - There is a carry propagating bug in the x86_64
        Montgomery squaring procedure in OpenSSL before 1.0.2m
        and 1.1.0 before 1.1.0g. No EC algorithms are affected.
        Analysis suggests that attacks against RSA and DSA as a
        result of this defect would be very difficult to
        perform and are not believed likely. Attacks against DH
        are considered just feasible (although very difficult)
        because most of the work necessary to deduce
        information about a private key may be performed
        offline. The amount of resources required for such an
        attack would be very significant and likely only
        accessible to a limited number of attackers. An
        attacker would additionally need online access to an
        unpatched system using the target private key in a
        scenario with persistent DH parameters and a private
        key that is shared between multiple clients. This only
        affects processors that support the BMI1, BMI2 and ADX
        extensions like Intel Broadwell (5th generation) and
        later or AMD Ryzen.(CVE-2017-3736)
    
      - A flaw was discovered in the way OpenSSL handled DTLS
        packets. A remote attacker could use this flaw to cause
        a DTLS server or client using OpenSSL to crash or use
        excessive amounts of memory.(CVE-2014-3505)
    
      - The dtls1_reassemble_fragment function in d1_both.c in
        OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1
        before 1.0.1h does not properly validate fragment
        lengths in DTLS ClientHello messages, which allows
        remote attackers to execute arbitrary code or cause a
        denial of service (buffer overflow and application
        crash) via a long non-initial fragment.(CVE-2014-0195)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the EulerOS security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues.");
      # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1547
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?21e8b4ff");
      script_set_attribute(attribute:"solution", value:
    "Update the affected openssl packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_cwe_id(20, 189, 310, 399);
    
      script_set_attribute(attribute:"patch_publication_date", value:"2019/05/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/05/14");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:openssl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:openssl-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:openssl-libs");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:3.0.1.0");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Huawei Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/EulerOS/release");
    if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
    uvp = get_kb_item("Host/EulerOS/uvp_version");
    if (uvp != "3.0.1.0") audit(AUDIT_OS_NOT, "EulerOS Virtualization 3.0.1.0");
    if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);
    
    flag = 0;
    
    pkgs = ["openssl-1.0.2k-16.h5",
            "openssl-devel-1.0.2k-16.h5",
            "openssl-libs-1.0.2k-16.h5"];
    
    foreach (pkg in pkgs)
      if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openssl");
    }
    
  • NASL familyWeb Servers
    NASL idOPENSSL_1_0_0A.NASL
    descriptionAccording to its banner, the remote web server is running a version of OpenSSL older than 0.9.8o / 1.0.0a. Such versions have the following vulnerabilities : - The mishandling of Cryptographic Message Syntax structures containing an OriginatorInfo element can lead to data being written to invalid memory addresses or memory being freed up twice. (CVE-2010-0742) - An uninitialized buffer of undefined length is returned when verification recovery fails for RSA keys. This allows an attacker to bypass key checks in applications calling the function EVP_PKEY_verify_recover(). Note this function is not used by OpenSSLcode itself. (CVE-2010-1633)
    last seen2020-06-01
    modified2020-06-02
    plugin id46801
    published2010-06-03
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/46801
    titleOpenSSL < 0.9.8o / 1.0.0a Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    
    if (description)
    {
      script_id(46801);
      script_version("1.10");
      script_cvs_date("Date: 2018/07/16 14:09:14");
    
      script_cve_id("CVE-2010-0742", "CVE-2010-1633");
      script_bugtraq_id(40502, 40503);
      script_xref(name:"Secunia", value:"40024");
    
      script_name(english:"OpenSSL < 0.9.8o / 1.0.0a Multiple Vulnerabilities");
      script_summary(english:"Does a banner check");
    
      script_set_attribute(
        attribute:"synopsis",
        value:"The remote web server has a SSL-related vulnerability."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "According to its banner, the remote web server is running a version
    of OpenSSL older than 0.9.8o / 1.0.0a.  Such versions have the
    following vulnerabilities :
    
      - The mishandling of Cryptographic Message Syntax 
        structures containing an OriginatorInfo element can 
        lead to data being written to invalid memory addresses 
        or memory being freed up twice. (CVE-2010-0742)
    
      - An uninitialized buffer of undefined length is returned
        when verification recovery fails for RSA keys. This 
        allows an attacker to bypass key checks in applications
        calling the function EVP_PKEY_verify_recover(). Note 
        this function is not used by OpenSSLcode itself. 
        (CVE-2010-1633)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.openssl.org/news/secadv/20100601.txt"
      );
      script_set_attribute(
        attribute:"solution",
        value:"Upgrade to OpenSSL 0.9.8o / 1.0.0a or later."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_set_attribute(attribute:"vuln_publication_date",value:"2010/06/01");
      script_set_attribute(attribute:"patch_publication_date",value:"2010/06/01");
      script_set_attribute(attribute:"plugin_publication_date",value:"2010/06/03");
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:openssl:openssl");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Web Servers");
    
      script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");
    
      script_dependencie("http_version.nasl");
      script_require_ports("Services/www", 80);
      script_require_keys("Settings/ParanoidReport");
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    include("backport.inc");
    
    
    if (report_paranoia < 2)
      exit(1, "This plugin only runs if 'Report paranoia' is set to 'Paranoid'.");
    
    port = get_http_port(default:80);
    
    banner = get_backport_banner(banner:get_http_banner(port:port));
    if (!banner) 
      exit(1, "Unable to get the banner from the web server on port "+port+".");
    
    if (!egrep(string:banner, pattern:'^Server:'))
      exit(0, "The web server on port "+port+" doesn't return a Server response header.");
    if ("OpenSSL/" >!< banner)
      exit(0, "The Server response header for the web server on port "+port+" doesn't mention OpenSSL.");
    
    pat = "^Server:.*OpenSSL/([^ ]+)";
    version = NULL;
    
    foreach line (split(banner, sep:'\r\n', keep:FALSE))
    {
      match = eregmatch(pattern:pat, string:line);
      if (!isnull(match))
      {
        version = match[1];
        break;
      }
    }
    if (isnull(version))
      exit(0, "The web server on port "+port+" doesn't appear to use OpenSSL.");
    
    if (
      (version =~ "^0\.9\.([0-7]([^0-9]|$)|8([^a-z0-9]|[a-n]|$))") ||
      (version =~ "^1\.0\.0(-beta|$)")
    )
    {
      if (report_verbosity > 0)
      {
        report =
          '\nOpenSSL version '+version+' appears to be running on the remote\n'+
          'host based on the following Server response header :\n\n'+
          '  '+line+'\n';
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
      exit(0);
    }
    else exit(0, 'The web server on port "+port+" uses OpenSSL '+version+', which is not affected.');
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-9574.NASL
    descriptionMinor update from upstream fixing two security vulnerabilities - CVE-2010-0742 and CVE-2010-1633. It is fully ABI compatible with openssl-1.0.0. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id47542
    published2010-07-01
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/47542
    titleFedora 13 : openssl-1.0.0a-1.fc13 (2010-9574)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2010-9574.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(47542);
      script_version("1.14");
      script_cvs_date("Date: 2019/08/02 13:32:33");
    
      script_cve_id("CVE-2010-0742", "CVE-2010-1633");
      script_bugtraq_id(40503);
      script_xref(name:"FEDORA", value:"2010-9574");
    
      script_name(english:"Fedora 13 : openssl-1.0.0a-1.fc13 (2010-9574)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Minor update from upstream fixing two security vulnerabilities -
    CVE-2010-0742 and CVE-2010-1633. It is fully ABI compatible with
    openssl-1.0.0.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=598732"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=598738"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2010-June/042855.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?5da790a8"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected openssl package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:openssl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:13");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2010/06/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2010/07/01");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^13([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 13.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC13", reference:"openssl-1.0.0a-1.fc13")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openssl");
    }
    
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL17248.NASL
    descriptionThe Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors. (CVE-2010-0742) Impact A locally authenticated user, with a role that allowsadvanced shell (bash) access, may be able to exploit OpenSSL to modify invalid memory locations or conduct double-free attacks, and execute arbitrary code. However, affected F5 products that contain the vulnerable software component do not use the components in a way that exposes this vulnerability. There are no remote access vectors for this issue, and there is no data plane exposure.
    last seen2020-06-01
    modified2020-06-02
    plugin id85890
    published2015-09-10
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85890
    titleF5 Networks BIG-IP : OpenSSL vulnerability (K17248)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from F5 Networks BIG-IP Solution K17248.
    #
    # The text description of this plugin is (C) F5 Networks.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85890);
      script_version("2.6");
      script_cvs_date("Date: 2019/01/04 10:03:40");
    
      script_cve_id("CVE-2010-0742");
      script_bugtraq_id(40502);
    
      script_name(english:"F5 Networks BIG-IP : OpenSSL vulnerability (K17248)");
      script_summary(english:"Checks the BIG-IP version.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote device is missing a vendor-supplied security patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The Cryptographic Message Syntax (CMS) implementation in
    crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a
    does not properly handle structures that contain OriginatorInfo, which
    allows context-dependent attackers to modify invalid memory locations
    or conduct double-free attacks, and possibly execute arbitrary code,
    via unspecified vectors. (CVE-2010-0742)
    
    Impact
    
    A locally authenticated user, with a role that allowsadvanced shell
    (bash) access, may be able to exploit OpenSSL to modify invalid memory
    locations or conduct double-free attacks, and execute arbitrary code.
    However, affected F5 products that contain the vulnerable software
    component do not use the components in a way that exposes this
    vulnerability. There are no remote access vectors for this issue, and
    there is no data plane exposure."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://support.f5.com/csp/article/K17248"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade to one of the non-vulnerable versions listed in the F5
    Solution K17248."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"potential_vulnerability", value:"true");
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_access_policy_manager");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_security_manager");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_global_traffic_manager");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_link_controller");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_local_traffic_manager");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_wan_optimization_manager");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_webaccelerator");
      script_set_attribute(attribute:"cpe", value:"cpe:/h:f5:big-ip");
      script_set_attribute(attribute:"cpe", value:"cpe:/h:f5:big-ip_protocol_security_manager");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/09/09");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/09/10");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"F5 Networks Local Security Checks");
    
      script_dependencies("f5_bigip_detect.nbin");
      script_require_keys("Host/local_checks_enabled", "Host/BIG-IP/hotfix", "Host/BIG-IP/modules", "Host/BIG-IP/version", "Settings/ParanoidReport");
    
      exit(0);
    }
    
    
    include("f5_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    version = get_kb_item("Host/BIG-IP/version");
    if ( ! version ) audit(AUDIT_OS_NOT, "F5 Networks BIG-IP");
    if ( isnull(get_kb_item("Host/BIG-IP/hotfix")) ) audit(AUDIT_KB_MISSING, "Host/BIG-IP/hotfix");
    if ( ! get_kb_item("Host/BIG-IP/modules") ) audit(AUDIT_KB_MISSING, "Host/BIG-IP/modules");
    
    sol = "K17248";
    vmatrix = make_array();
    
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    # APM
    vmatrix["APM"] = make_array();
    vmatrix["APM"]["affected"  ] = make_list("10.1.0-10.2.4");
    vmatrix["APM"]["unaffected"] = make_list("12.0.0","11.0.0-11.6.0");
    
    # ASM
    vmatrix["ASM"] = make_array();
    vmatrix["ASM"]["affected"  ] = make_list("10.1.0-10.2.4");
    vmatrix["ASM"]["unaffected"] = make_list("12.0.0","11.0.0-11.6.0");
    
    # GTM
    vmatrix["GTM"] = make_array();
    vmatrix["GTM"]["affected"  ] = make_list("10.1.0-10.2.4");
    vmatrix["GTM"]["unaffected"] = make_list("11.0.0-11.6.0");
    
    # LC
    vmatrix["LC"] = make_array();
    vmatrix["LC"]["affected"  ] = make_list("10.1.0-10.2.4");
    vmatrix["LC"]["unaffected"] = make_list("12.0.0","11.0.0-11.6.0");
    
    # LTM
    vmatrix["LTM"] = make_array();
    vmatrix["LTM"]["affected"  ] = make_list("10.1.0-10.2.4");
    vmatrix["LTM"]["unaffected"] = make_list("12.0.0","11.0.0-11.6.0");
    
    # PSM
    vmatrix["PSM"] = make_array();
    vmatrix["PSM"]["affected"  ] = make_list("10.1.0-10.2.4");
    vmatrix["PSM"]["unaffected"] = make_list("11.0.0-11.4.1");
    
    # WAM
    vmatrix["WAM"] = make_array();
    vmatrix["WAM"]["affected"  ] = make_list("10.1.0-10.2.4");
    vmatrix["WAM"]["unaffected"] = make_list("11.0.0-11.3.0");
    
    # WOM
    vmatrix["WOM"] = make_array();
    vmatrix["WOM"]["affected"  ] = make_list("10.1.0-10.2.4");
    vmatrix["WOM"]["unaffected"] = make_list("11.0.0-11.3.0");
    
    
    if (bigip_is_affected(vmatrix:vmatrix, sol:sol))
    {
      if (report_verbosity > 0) security_hole(port:0, extra:bigip_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = bigip_get_tested_modules();
      audit_extra = "For BIG-IP module(s) " + tested + ",";
      if (tested) audit(AUDIT_INST_VER_NOT_VULN, audit_extra, version);
      else audit(AUDIT_HOST_NOT, "running any of the affected modules");
    }
    
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0033_OPENSSL.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has openssl packages installed that are affected by multiple vulnerabilities: - OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an error state mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected. (CVE-2017-3737) - There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository. (CVE-2017-3738) - There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen. (CVE-2017-3736) - OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition. (CVE-2006-2937) - OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) public exponent or (2) public modulus values in X.509 certificates that require extra time to process when using RSA signature verification. (CVE-2006-2940) - Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers. (CVE-2006-3738) - OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. (CVE-2006-4339) - The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference. (CVE-2006-4343) - The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys. (CVE-2007-3108) - Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors. (CVE-2007-4995) - Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible. (CVE-2007-5135) - Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information. (CVE-2008-0891) - OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses particular cipher suites, which triggers a NULL pointer dereference. (CVE-2008-1672) - The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of future epoch DTLS records that are buffered in a queue, aka DTLS record buffer limitation bug. (CVE-2009-1377) - Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka DTLS fragment handling memory leak. (CVE-2009-1378) - Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate. (CVE-2009-1379) - The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post- renegotiation context, related to a plaintext injection attack, aka the Project Mogul issue. (CVE-2009-3555) - Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678. (CVE-2009-4355) - The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors. (CVE-2010-0742) - RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors. NOTE: some of these details are obtained from third party information. (CVE-2010-1633) - Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi- threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap- based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography. (CVE-2010-3864) - OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier. (CVE-2010-4180) - ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka OCSP stapling vulnerability. (CVE-2011-0014) - crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past. (CVE-2011-3207) - OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108. (CVE-2012-0050) - The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. (CVE-2012-2110) - The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. (CVE-2013-4353) - The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client. (CVE-2013-6449) - The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c. (CVE-2013-6450) - An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys. (CVE-2014-0160) - A flaw was found in the way SSL 3.0 handled padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. This flaw allows a man-in-the-middle (MITM) attacker to decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. (CVE-2014-3566) - A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127201
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127201
    titleNewStart CGSL CORE 5.04 / MAIN 5.04 : openssl Multiple Vulnerabilities (NS-SA-2019-0033)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # The descriptive text and package checks in this plugin were
    # extracted from ZTE advisory NS-SA-2019-0033. The text
    # itself is copyright (C) ZTE, Inc.
    
    include("compat.inc");
    
    if (description)
    {
      script_id(127201);
      script_version("1.3");
      script_cvs_date("Date: 2019/09/24 11:01:33");
    
      script_cve_id(
        "CVE-2006-2937",
        "CVE-2006-2940",
        "CVE-2006-3738",
        "CVE-2006-4339",
        "CVE-2006-4343",
        "CVE-2007-3108",
        "CVE-2007-4995",
        "CVE-2007-5135",
        "CVE-2008-0891",
        "CVE-2008-1672",
        "CVE-2009-1377",
        "CVE-2009-1378",
        "CVE-2009-1379",
        "CVE-2009-3555",
        "CVE-2009-4355",
        "CVE-2010-0742",
        "CVE-2010-1633",
        "CVE-2010-3864",
        "CVE-2010-4180",
        "CVE-2011-0014",
        "CVE-2011-3207",
        "CVE-2012-0050",
        "CVE-2012-2110",
        "CVE-2013-4353",
        "CVE-2013-6449",
        "CVE-2013-6450",
        "CVE-2014-0160",
        "CVE-2014-3566",
        "CVE-2016-2183",
        "CVE-2017-3736",
        "CVE-2017-3737",
        "CVE-2017-3738"
      );
      script_bugtraq_id(92630);
    
      script_name(english:"NewStart CGSL CORE 5.04 / MAIN 5.04 : openssl Multiple Vulnerabilities (NS-SA-2019-0033)");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote machine is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has openssl packages installed that are affected
    by multiple vulnerabilities:
    
      - OpenSSL 1.0.2 (starting from version 1.0.2b) introduced
        an error state mechanism. The intent was that if a
        fatal error occurred during a handshake then OpenSSL
        would move into the error state and would immediately
        fail if you attempted to continue the handshake. This
        works as designed for the explicit handshake functions
        (SSL_do_handshake(), SSL_accept() and SSL_connect()),
        however due to a bug it does not work correctly if
        SSL_read() or SSL_write() is called directly. In that
        scenario, if the handshake fails then a fatal error will
        be returned in the initial function call. If
        SSL_read()/SSL_write() is subsequently called by the
        application for the same SSL object then it will succeed
        and the data is passed without being decrypted/encrypted
        directly from the SSL/TLS record layer. In order to
        exploit this issue an application bug would have to be
        present that resulted in a call to
        SSL_read()/SSL_write() being issued after having already
        received a fatal error. OpenSSL version 1.0.2b-1.0.2m
        are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is
        not affected. (CVE-2017-3737)
    
      - There is an overflow bug in the AVX2 Montgomery
        multiplication procedure used in exponentiation with
        1024-bit moduli. No EC algorithms are affected. Analysis
        suggests that attacks against RSA and DSA as a result of
        this defect would be very difficult to perform and are
        not believed likely. Attacks against DH1024 are
        considered just feasible, because most of the work
        necessary to deduce information about a private key may
        be performed offline. The amount of resources required
        for such an attack would be significant. However, for an
        attack on TLS to be meaningful, the server would have to
        share the DH1024 private key among multiple clients,
        which is no longer an option since CVE-2016-0701. This
        only affects processors that support the AVX2 but not
        ADX extensions like Intel Haswell (4th generation).
        Note: The impact from this issue is similar to
        CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL
        version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected.
        Fixed in OpenSSL 1.0.2n. Due to the low severity of this
        issue we are not issuing a new release of OpenSSL 1.1.0
        at this time. The fix will be included in OpenSSL 1.1.0h
        when it becomes available. The fix is also available in
        commit e502cc86d in the OpenSSL git repository.
        (CVE-2017-3738)
    
      - There is a carry propagating bug in the x86_64
        Montgomery squaring procedure in OpenSSL before 1.0.2m
        and 1.1.0 before 1.1.0g. No EC algorithms are affected.
        Analysis suggests that attacks against RSA and DSA as a
        result of this defect would be very difficult to perform
        and are not believed likely. Attacks against DH are
        considered just feasible (although very difficult)
        because most of the work necessary to deduce information
        about a private key may be performed offline. The amount
        of resources required for such an attack would be very
        significant and likely only accessible to a limited
        number of attackers. An attacker would additionally need
        online access to an unpatched system using the target
        private key in a scenario with persistent DH parameters
        and a private key that is shared between multiple
        clients. This only affects processors that support the
        BMI1, BMI2 and ADX extensions like Intel Broadwell (5th
        generation) and later or AMD Ryzen. (CVE-2017-3736)
    
      - OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d
        allows remote attackers to cause a denial of service
        (infinite loop and memory consumption) via malformed
        ASN.1 structures that trigger an improperly handled
        error condition. (CVE-2006-2937)
    
      - OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and
        earlier versions allows attackers to cause a denial of
        service (CPU consumption) via parasitic public keys with
        large (1) public exponent or (2) public modulus
        values in X.509 certificates that require extra time to
        process when using RSA signature verification.
        (CVE-2006-2940)
    
      - Buffer overflow in the SSL_get_shared_ciphers function
        in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and
        earlier versions has unspecified impact and remote
        attack vectors involving a long list of ciphers.
        (CVE-2006-3738)
    
      - OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8
        before 0.9.8c, when using an RSA key with exponent 3,
        removes PKCS-1 padding before generating a hash, which
        allows remote attackers to forge a PKCS #1 v1.5
        signature that is signed by that RSA key and prevents
        OpenSSL from correctly verifying X.509 and other
        certificates that use PKCS #1. (CVE-2006-4339)
    
      - The get_server_hello function in the SSLv2 client code
        in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and
        earlier versions allows remote servers to cause a denial
        of service (client crash) via unknown vectors that
        trigger a null pointer dereference. (CVE-2006-4343)
    
      - The BN_from_montgomery function in crypto/bn/bn_mont.c
        in OpenSSL 0.9.8e and earlier does not properly perform
        Montgomery multiplication, which might allow local users
        to conduct a side-channel attack and retrieve RSA
        private keys. (CVE-2007-3108)
    
      - Off-by-one error in the DTLS implementation in OpenSSL
        0.9.8 before 0.9.8f allows remote attackers to execute
        arbitrary code via unspecified vectors. (CVE-2007-4995)
    
      - Off-by-one error in the SSL_get_shared_ciphers function
        in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f,
        might allow remote attackers to execute arbitrary code
        via a crafted packet that triggers a one-byte buffer
        underflow. NOTE: this issue was introduced as a result
        of a fix for CVE-2006-3738. As of 20071012, it is
        unknown whether code execution is possible.
        (CVE-2007-5135)
    
      - Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g,
        when the TLS server name extensions are enabled, allows
        remote attackers to cause a denial of service (crash)
        via a malformed Client Hello packet. NOTE: some of these
        details are obtained from third party information.
        (CVE-2008-0891)
    
      - OpenSSL 0.9.8f and 0.9.8g allows remote attackers to
        cause a denial of service (crash) via a TLS handshake
        that omits the Server Key Exchange message and uses
        particular cipher suites, which triggers a NULL
        pointer dereference. (CVE-2008-1672)
    
      - The dtls1_buffer_record function in ssl/d1_pkt.c in
        OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote
        attackers to cause a denial of service (memory
        consumption) via a large series of future epoch DTLS
        records that are buffered in a queue, aka DTLS record
        buffer limitation bug. (CVE-2009-1377)
    
      - Multiple memory leaks in the
        dtls1_process_out_of_seq_message function in
        ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8
        versions allow remote attackers to cause a denial of
        service (memory consumption) via DTLS records that (1)
        are duplicates or (2) have sequence numbers much greater
        than current sequence numbers, aka DTLS fragment
        handling memory leak. (CVE-2009-1378)
    
      - Use-after-free vulnerability in the
        dtls1_retrieve_buffered_fragment function in
        ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote
        attackers to cause a denial of service (openssl s_client
        crash) and possibly have unspecified other impact via a
        DTLS packet, as demonstrated by a packet from a server
        that uses a crafted server certificate. (CVE-2009-1379)
    
      - The TLS protocol, and the SSL protocol 3.0 and possibly
        earlier, as used in Microsoft Internet Information
        Services (IIS) 7.0, mod_ssl in the Apache HTTP Server
        2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5
        and earlier, Mozilla Network Security Services (NSS)
        3.12.4 and earlier, multiple Cisco products, and other
        products, does not properly associate renegotiation
        handshakes with an existing connection, which allows
        man-in-the-middle attackers to insert data into HTTPS
        sessions, and possibly other types of sessions protected
        by TLS or SSL, by sending an unauthenticated request
        that is processed retroactively by a server in a post-
        renegotiation context, related to a plaintext
        injection attack, aka the Project Mogul issue.
        (CVE-2009-3555)
    
      - Memory leak in the zlib_stateful_finish function in
        crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and
        1.0.0 Beta through Beta 4 allows remote attackers to
        cause a denial of service (memory consumption) via
        vectors that trigger incorrect calls to the
        CRYPTO_cleanup_all_ex_data function, as demonstrated by
        use of SSLv3 and PHP with the Apache HTTP Server, a
        related issue to CVE-2008-1678. (CVE-2009-4355)
    
      - The Cryptographic Message Syntax (CMS) implementation in
        crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x
        before 1.0.0a does not properly handle structures that
        contain OriginatorInfo, which allows context-dependent
        attackers to modify invalid memory locations or conduct
        double-free attacks, and possibly execute arbitrary
        code, via unspecified vectors. (CVE-2010-0742)
    
      - RSA verification recovery in the EVP_PKEY_verify_recover
        function in OpenSSL 1.x before 1.0.0a, as used by
        pkeyutl and possibly other applications, returns
        uninitialized memory upon failure, which might allow
        context-dependent attackers to bypass intended key
        requirements or obtain sensitive information via
        unspecified vectors. NOTE: some of these details are
        obtained from third party information. (CVE-2010-1633)
    
      - Multiple race conditions in ssl/t1_lib.c in OpenSSL
        0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-
        threading and internal caching are enabled on a TLS
        server, might allow remote attackers to execute
        arbitrary code via client data that triggers a heap-
        based buffer overflow, related to (1) the TLS server
        name extension and (2) elliptic curve cryptography.
        (CVE-2010-3864)
    
      - OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when
        SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does
        not properly prevent modification of the ciphersuite in
        the session cache, which allows remote attackers to
        force the downgrade to an unintended cipher via vectors
        involving sniffing network traffic to discover a session
        identifier. (CVE-2010-4180)
    
      - ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0
        through 1.0.0c allows remote attackers to cause a denial
        of service (crash), and possibly obtain sensitive
        information in applications that use OpenSSL, via a
        malformed ClientHello handshake message that triggers an
        out-of-bounds memory access, aka OCSP stapling
        vulnerability. (CVE-2011-0014)
    
      - crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e
        does not initialize certain structure members, which
        makes it easier for remote attackers to bypass CRL
        validation by using a nextUpdate value corresponding to
        a time in the past. (CVE-2011-3207)
    
      - OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS
        applications, which allows remote attackers to cause a
        denial of service (crash) via unspecified vectors
        related to an out-of-bounds read. NOTE: this
        vulnerability exists because of an incorrect fix for
        CVE-2011-4108. (CVE-2012-0050)
    
      - The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c
        in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1
        before 1.0.1a does not properly interpret integer data,
        which allows remote attackers to conduct buffer overflow
        attacks, and cause a denial of service (memory
        corruption) or possibly have unspecified other impact,
        via crafted DER data, as demonstrated by an X.509
        certificate or an RSA public key. (CVE-2012-2110)
    
      - The ssl3_take_mac function in ssl/s3_both.c in OpenSSL
        1.0.1 before 1.0.1f allows remote TLS servers to cause a
        denial of service (NULL pointer dereference and
        application crash) via a crafted Next Protocol
        Negotiation record in a TLS handshake. (CVE-2013-4353)
    
      - The ssl_get_algorithm2 function in ssl/s3_lib.c in
        OpenSSL before 1.0.2 obtains a certain version number
        from an incorrect data structure, which allows remote
        attackers to cause a denial of service (daemon crash)
        via crafted traffic from a TLS 1.2 client.
        (CVE-2013-6449)
    
      - The DTLS retransmission implementation in OpenSSL 1.0.0
        before 1.0.0l and 1.0.1 before 1.0.1f does not properly
        maintain data structures for digest and encryption
        contexts, which might allow man-in-the-middle attackers
        to trigger the use of a different context and cause a
        denial of service (application crash) by interfering
        with packet delivery, related to ssl/d1_both.c and
        ssl/t1_enc.c. (CVE-2013-6450)
    
      - An information disclosure flaw was found in the way
        OpenSSL handled TLS and DTLS Heartbeat Extension
        packets. A malicious TLS or DTLS client or server could
        send a specially crafted TLS or DTLS Heartbeat packet to
        disclose a limited portion of memory per request from a
        connected client or server. Note that the disclosed
        portions of memory could potentially include sensitive
        information such as private keys. (CVE-2014-0160)
    
      - A flaw was found in the way SSL 3.0 handled padding
        bytes when decrypting messages encrypted using block
        ciphers in cipher block chaining (CBC) mode. This flaw
        allows a man-in-the-middle (MITM) attacker to decrypt a
        selected byte of a cipher text in as few as 256 tries if
        they are able to force a victim application to
        repeatedly send the same data over newly created SSL 3.0
        connections. (CVE-2014-3566)
    
      - A flaw was found in the way the DES/3DES cipher was used
        as part of the TLS/SSL protocol. A man-in-the-middle
        attacker could use this flaw to recover some plaintext
        data by capturing large amounts of encrypted traffic
        between TLS/SSL server and client if the communication
        used a DES/3DES based ciphersuite. (CVE-2016-2183)
    
    Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
    number.");
      script_set_attribute(attribute:"see_also", value:"http://security.gd-linux.com/notice/NS-SA-2019-0033");
      script_set_attribute(attribute:"solution", value:
    "Upgrade the vulnerable CGSL openssl packages. Note that updated packages may not be available yet. Please contact ZTE
    for more information.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2006-3738");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_cwe_id(119, 189, 287, 310, 399);
    
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/09/05");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/07/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/08/12");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"NewStart CGSL Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/ZTE-CGSL/release", "Host/ZTE-CGSL/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/ZTE-CGSL/release");
    if (isnull(release) || release !~ "^CGSL (MAIN|CORE)") audit(AUDIT_OS_NOT, "NewStart Carrier Grade Server Linux");
    
    if (release !~ "CGSL CORE 5.04" &&
        release !~ "CGSL MAIN 5.04")
      audit(AUDIT_OS_NOT, 'NewStart CGSL CORE 5.04 / NewStart CGSL MAIN 5.04');
    
    if (!get_kb_item("Host/ZTE-CGSL/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "NewStart Carrier Grade Server Linux", cpu);
    
    flag = 0;
    
    pkgs = {
      "CGSL CORE 5.04": [
        "openssl-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd",
        "openssl-crypto-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd",
        "openssl-debuginfo-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd",
        "openssl-devel-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd",
        "openssl-libs-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd",
        "openssl-perl-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd",
        "openssl-static-1.0.2k-12.el7.cgslv5lite.0.1.g0e5ddfd"
      ],
      "CGSL MAIN 5.04": [
        "openssl-1.0.2k-12.el7.cgslv5",
        "openssl-debuginfo-1.0.2k-12.el7.cgslv5",
        "openssl-devel-1.0.2k-12.el7.cgslv5",
        "openssl-libs-1.0.2k-12.el7.cgslv5",
        "openssl-perl-1.0.2k-12.el7.cgslv5",
        "openssl-static-1.0.2k-12.el7.cgslv5"
      ]
    };
    pkg_list = pkgs[release];
    
    foreach (pkg in pkg_list)
      if (rpm_check(release:"ZTE " + release, reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openssl");
    }
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201110-01.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201110-01 (OpenSSL: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers referenced below for details. Impact : A context-dependent attacker could cause a Denial of Service, possibly execute arbitrary code, bypass intended key requirements, force the downgrade to unintended ciphers, bypass the need for knowledge of shared secrets and successfully authenticate, bypass CRL validation, or obtain sensitive information in applications that use OpenSSL. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id56425
    published2011-10-10
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56425
    titleGLSA-201110-01 : OpenSSL: Multiple vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 201110-01.
    #
    # The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(56425);
      script_version("1.26");
      script_cvs_date("Date: 2018/07/11 17:09:26");
    
      script_cve_id("CVE-2009-3245", "CVE-2009-4355", "CVE-2010-0433", "CVE-2010-0740", "CVE-2010-0742", "CVE-2010-1633", "CVE-2010-2939", "CVE-2010-3864", "CVE-2010-4180", "CVE-2010-4252", "CVE-2011-0014", "CVE-2011-3207", "CVE-2011-3210");
      script_xref(name:"GLSA", value:"201110-01");
    
      script_name(english:"GLSA-201110-01 : OpenSSL: Multiple vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-201110-01
    (OpenSSL: Multiple vulnerabilities)
    
        Multiple vulnerabilities have been discovered in OpenSSL. Please review
          the CVE identifiers referenced below for details.
      
    Impact :
    
        A context-dependent attacker could cause a Denial of Service, possibly
          execute arbitrary code, bypass intended key requirements, force the
          downgrade to unintended ciphers, bypass the need for knowledge of shared
          secrets and successfully authenticate, bypass CRL validation, or obtain
          sensitive information in applications that use OpenSSL.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/201110-01"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All OpenSSL users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose '>=dev-libs/openssl-1.0.0e'
        NOTE: This is a legacy GLSA. Updates for all affected architectures are
          available since September 17, 2011. It is likely that your system is
          already no longer affected by most of these issues."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_cwe_id(20, 399);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:openssl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2011/10/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2011/10/10");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"dev-libs/openssl", unaffected:make_list("ge 1.0.0e", "rge 0.9.8r", "rge 0.9.8s", "rge 0.9.8t", "rge 0.9.8u", "rge 0.9.8v", "rge 0.9.8w", "rge 0.9.8x", "rge 0.9.8y", "rge 0.9.8z_p1", "rge 0.9.8z_p2", "rge 0.9.8z_p3", "rge 0.9.8z_p4", "rge 0.9.8z_p5", "rge 0.9.8z_p6", "rge 0.9.8z_p7", "rge 0.9.8z_p8", "rge 0.9.8z_p9", "rge 0.9.8z_p10", "rge 0.9.8z_p11", "rge 0.9.8z_p12", "rge 0.9.8z_p13", "rge 0.9.8z_p14", "rge 0.9.8z_p15"), vulnerable:make_list("lt 1.0.0e"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "OpenSSL");
    }
    

Oval

accepted2015-04-20T04:00:23.311-04:00
classvulnerability
contributors
  • nameSudha Akula
    organizationHewlett-Packard
  • nameSushant Kumar Singh
    organizationHewlett-Packard
  • nameSushant Kumar Singh
    organizationHewlett-Packard
  • namePrashant Kumar
    organizationHewlett-Packard
  • nameMike Cokus
    organizationThe MITRE Corporation
descriptionThe Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors.
familyunix
idoval:org.mitre.oval:def:12395
statusaccepted
submitted2011-01-31T15:31:24.000-05:00
titleHP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS)
version49

Seebug

  • bulletinFamilyexploit
    descriptionBUGTRAQ ID: 40502 CVE ID: CVE-2010-0742 OpenSSL是一种开放源码的SSL实现,用来实现网络通信的高强度加密,现在被广泛地用于各种网络应用程序中。 OpenSSL没有正确地处理加密消息句法(CMS)结构,远程攻击者可以通过包含有OriginatorInfo元素的特制CMS结构触发无效内存地址写入或双重释放,导致执行任意代码。 OpenSSL 1.0.0 OpenSSL 0.9.8 厂商补丁: OpenSSL Project --------------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.openssl.org/source/openssl-0.9.8o.tar.gz http://www.openssl.org/source/openssl-1.0.0a.tar.gz
    idSSV:19735
    last seen2017-11-19
    modified2010-06-04
    published2010-06-04
    reporterRoot
    titleOpenSSL CMS结构处理内存破坏漏洞
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:19727
    last seen2017-11-19
    modified2010-06-03
    published2010-06-03
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-19727
    titleOpenSSL Cryptographic Message Syntax &quot;OriginatorInfo&quot; Vulnerability