OpenSSL ChangeCipherSpec
OpenSSL ChangeCipherSpec
ChangeCipherSpec
June 9, 2014 at 8:27am EDT
[codydumont]
SC RESEARCH
Confidential: The following report contains confidential information. Do not distribute,
email, fax, or transfer via any electronic mechanism unless it has been approved by the
recipient company's security policy. All copies and backups of this document should be
saved on protected storage at all times. Do not share any of the information contained
within this report with anyone unless they are authorized to view the information. Violating
any of the previous instructions is grounds for termination.
Table of Contents
About this Report .................................................................................................................................................................................................. 1
Table of Contents
OpenSSL ChangeCipherSpec i
About this Report
As new threats emerge in networks, SecurityCenter customers are able to properly identify risk. This report
identifies systems vulnerable to the new OpenSSL ChangeCipherSpec vulnerability.
This report provides SecurityCenter customers with a good summary of the new vulnerabilities recently
discovered within OpenSSL. There are six CVEs related to this new vulnerability. They are:
CVE-2014-0224 - SSL/TLS MITM Vulnerability
CVE-2014-0221 - DTLS recursion flaw
CVE-2014-0195 - DTLS invalid fragment vulnerability
CVE-2014-0198 - SSL_MODE_RELEASE_BUFFERS NULL pointer dereference
CVE-2010-5298 - SSL_MODE_RELEASE_BUFFERS session injection
CVE-2014-3470 - Anonymous ECDH Denial of Service
This report contains three chapters which focus on the six CVEs related to the OpenSSL ChangeCipherSpec
vulnerability and OpenSSL vulnerabilities alike.
OpenSSL ChangeCipherSpec Summary: This chapter contains an executive level understanding of how
vulnerable the systems have become.
OpenSSL ChangeCipherSpec Vulnerabilities: This chapter contains a vulnerability iterator based on the six
CVEs related to OpenSSL ChangeCipherSpec vulnerabilities. For each plugin associated with the CVEs, the
vulnerability details and a list of affected systems is provided.
OpenSSL Vulnerabilities: This chapter contains a vulnerability iterator based on the six CVEs related to
OpenSSL vulnerabilities. For each plugin associated with the CVEs, the vulnerability details and a list of
affected systems is provided.
OpenSSL ChangeCipherSpec 1
OpenSSL ChangeCipherSpec Summary
The OpenSSL ChangeCipherSpec Indicators matrix provides an overview of OpenSSL vulnerabilities and
the related ChangeCipherSpec vulnerabilities. There are three columns, one for each vulnerability type
(active, passive, event). Each column has an indicator for the six CVEs related to OpenSSL ChangeCipherSpec
vulnerability, and one indicator for all OpenSSL related vulnerabilities. The active and passive indicators will
turn red, signifying immediate action should be taken, while the event vulnerabilities are orange and signify
that administrators should investigate the true severity of the event.
The OpenSSL Vulnerability 7 Day Trends chart provides a 7 day trend analysis of systems with OpenSSL
vulnerabilities, with a separate trend line for each plugin type.
OpenSSL ChangeCipherSpec 2
The OpenSSL ChangeCipherSpec Subnet Summary provides a chart showing the count per subnet of all the
systems vulnerable to the six CVEs related to OpenSSL ChangeCipherSpec.
The ChangeCipherSpec Subnet Comparative Chart provides a comparative analysis showing the percentage
of the each of the top ten vulnerable subnets. The pie chart is sorted on the total affected hosts per subnet.
OpenSSL ChangeCipherSpec 3
OpenSSL ChangeCipherSpec
Vulnerabilities
This chapter contains a vulnerability iterator based on the six CVEs related to OpenSSL ChangeCipherSpec
vulnerabilities. For each plugin associated with the CVEs, two tables are displayed. The first table provides all
the vulnerability details, while the second provides a list of all the affected hosts, with the following details: IP
address, MAC Address, DNS Name, and repository.
Vulnerability Details
Description: The OpenSSL service on the remote host is vulnerable to a man-in-the-middle (MiTM) attack, based on its response to two consecutive
'ChangeCipherSpec' messages during the incorrect phase of an SSL/TLS handshake.
This flaw could allow a MiTM attacker to decrypt or forge SSL messages by telling the service to begin encrypted communications before key material
has been exchanged, which causes predictable keys to be used to secure future traffic.
Solution: OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za. OpenSSL 1.0.0 SSL/TLS users (client and/or server) should
upgrade to 1.0.0m. OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h.
Plugin Output:
The remote service accepted an SSL ChangeCipherSpec message at an incorrect point in the handshake
leading to weak keys being used, and then attempted to decrypt an SSL record using those weak keys.
CPE: cpe:/a:openssl:openssl
OpenSSL ChangeCipherSpec 4
CVE: CVE-2010-5298, CVE-2014-0076, CVE-2014-0195, CVE-2014-0198, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470
Crossref: OSVDB #104810, OSVDB #105763, OSVDB #106531, OSVDB #107729, OSVDB #107730, OSVDB #107731, OSVDB #107732, CERT #978508
OpenSSL ChangeCipherSpec 5
OpenSSL Vulnerabilities
This chapter contains a vulnerability iterator based on the all OpenSSL ChangeCipherSpec vulnerabilities. For
each plugin associated with OpenSSL, two tables are displayed. The first table provides all the vulnerability
details, while the second provides a list of all the affected hosts, with the following details: IP address, MAC
Address, DNS Name, and repository.
Vulnerability Details
Description: The OpenSSL service on the remote host is vulnerable to a man-in-the-middle (MiTM) attack, based on its response to two consecutive
'ChangeCipherSpec' messages during the incorrect phase of an SSL/TLS handshake.
This flaw could allow a MiTM attacker to decrypt or forge SSL messages by telling the service to begin encrypted communications before key material
has been exchanged, which causes predictable keys to be used to secure future traffic.
Solution: OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za. OpenSSL 1.0.0 SSL/TLS users (client and/or server) should
upgrade to 1.0.0m. OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h.
Plugin Output:
The remote service accepted an SSL ChangeCipherSpec message at an incorrect point in the handshake
leading to weak keys being used, and then attempted to decrypt an SSL record using those weak keys.
CPE: cpe:/a:openssl:openssl
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 6
Crossref: OSVDB #104810, OSVDB #105763, OSVDB #106531, OSVDB #107729, OSVDB #107730, OSVDB #107731, OSVDB #107732, CERT #978508
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 7
Vulnerability Details
Description: Based on its response to a TLS request with a specially crafted heartbeat message (RFC 6520), the remote service appears to be affected
by an out-of-bounds read flaw.
This flaw could allow a remote attacker to read the contents of up to 64KB of server memory, potentially exposing passwords, private keys, and other
sensitive data.
Alternatively, recompile OpenSSL with the '-DOPENSSL_NO_HEARTBEATS' flag to disable the vulnerable functionality.
STIG Severity: I
Plugin Output: Nessus was able to read the following memory from the remote service:
0x0000: 5F 70 47 00 01 88 00 A2 00 A3 00 AA 00 AB 00 9E _pG.............
0x0010: 00 9F 00 A4 00 A5 00 A0 00 A1 00 A6 00 A7 C0 2B ...............+
0x0020: C0 2C C0 2F C0 30 C0 2D C0 2E C0 31 C0 32 00 A8 .,./.0.-...1.2..
0x0030: 00 A9 00 AC 00 AD 00 9C 00 9D 00 63 00 65 00 11 ...........c.e..
0x0040: 00 13 00 32 00 38 00 44 00 87 00 12 00 66 00 99 ...2.8.D.....f..
0x0050: 00 8F 00 90 00 91 00 8E 00 14 00 16 00 33 00 39 .............3.9
0x0060: 00 45 00 88 00 15 00 9A 00 0B 00 0D 00 30 00 36 .E...........0.6
0x0070: 00 42 00 85 00 0C 00 97 00 0E 00 10 00 31 00 37 .B...........1.7
0x0080: 00 43 00 86 00 0F 00 98 00 19 00 17 00 1B 00 34 .C.............4
0x0090: 00 3A 00 46 00 89 00 1A 00 18 00 9B C0 08 C0 09 .:.F............
0x00A0: C0 0A C0 06 C0 07 C0 12 C0 13 C0 14 C0 10 C0 11 ................
0x00B0: C0 03 C0 04 C0 05 C0 01 C0 02 C0 0D C0 0E C0 0F ................
0x00C0: C0 0B C0 0C C0 15 C0 17 C0 18 C0 19 C0 16 00 29 ...............)
0x00D0: 00 26 00 2A 00 27 00 2B 00 28 00 23 00 1F 00 22 .&.*.'.+.(.#..."
0x00E0: 00 1E 00 25 00 21 00 24 00 20 00 00 00 8B 00 8C ...%.!.$. ......
0x00F0: 00 8D 00 8A 00 62 00 61 00 60 00 64 00 08 00 06 .....b.a.`.d....
0x0100: 00 03 00 93 00 94 00 95 00 92 00 0A 00 2F 00 35 ............./.5
0x0110: 00 41 00 84 00 09 00 07 00 01 00 02 00 04 00 05 .A..............
0x0120: 00 96 00 BD 00 C3 00 B2 00 B3 00 B4 00 B5 00 BE ................
0x0130: 00 C4 00 BB 00 C1 00 BC 00 C2 00 BF 00 C5 C0 23 ...............#
0x0140: C0 24 C0 34 C0 35 C0 37 C0 36 C0 38 C0 39 C0 3A .$.4.5.7.6.8.9.:
0x0150: C0 3B C0 33 C0 27 C0 28 C0 25 C0 26 C0 29 C0 2A .;.3.'.(.%.&.).*
0x0160: 00 81 00 83 00 80 00 82 00 AE 00 AF 00 B0 00 B1 ................
0x0170: 00 B6 00 B7 00 B8 00 B9 00 BA 00 C0 C0 1C C0 1F ................
0x0180: C0 22 C0 1B C0 1E C0 21 C0 1A C0 1D C0 20 01 00 .".....!..... ..
0x0190: 00 05 00 0F 00 01 01 67 65 3A 20 65 6E 0D 0A 41 .......ge: en..A
0x01A0: 63 63 65 70 74 2D 43 68 61 72 73 65 74 3A 20 69 ccept-Charset: i
0x01B0: 73 6F 2D 38 38 35 39 2D 31 2C 2A 2C 75 74 66 2D so-8859-1,*,utf-
0x01C0: 38 0D 0A 0D 0A E5 A9 AD 8F 00 67 57 F4 AD 72 80 8.........gW..r.
0x01D0: 20 3A 5C D0 59 66 A0 C4 A9 03 03 03 03 41 41 41 :\.Yf.......AAA
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 8
0x01E0: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
*
0x0560: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 0D 0A AAAAAAAAAAAAAA..
0x0570: 55 73 65 72 2D 41 67 65 6E 74 3A 20 4D 6F 7A 69 User-Agent: Mozi
0x0580: 6C 6C 61 2F 34 2E 30 20 28 63 6F 6D 70 61 74 69 lla/4.0 (compati
0x0590: 62 AA EC 16 B0 36 2D 82 04 C9 C4 50 00 47 7E 60 b....6-....P.G~`
0x05A0: 68 BB E0 36 03 07 07 07 07 07 07 07 07 00 00 00 h..6............
0x05B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
*
0x1000:
CPE: cpe:/a:openssl:openssl
CVE: CVE-2014-0160
BID: 66690
Crossref: OSVDB #105465, CERT #720951, IAVA #2014-A-0051, EDB-ID #32745, EDB-ID #32764
Vulnerability Details
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 9
openssl_x509_parse()
Memory Corruption
Plugin Text: Synopsis: The remote web server uses a version of PHP that is potentially affected by a memory corruption vulnerability.
Description: According to its banner, the version of PHP 5.4.x installed on the remote host is a version prior to 5.4.23. It is, therefore, potentially
affected by a memory corruption flaw in the way the openssl_x509_parse() function of the PHP OpenSSL extension parsed X.509 certificates. A remote
attacker could use this flaw to provide a malicious, self-signed certificate or a certificate signed by a trusted authority to a PHP application using the
aforementioned function. This could cause the application to crash or possibly allow the attacker to execute arbitrary code with the privileges of the user
running the PHP interpreter.
Note that this plugin does not attempt to exploit the vulnerability, but instead relies only on PHP's self-reported version number.
Plugin Output:
Version source : X-Powered-By: PHP/5.4.4-14+deb7u8
Installed version : 5.4.4-14+deb7u8
Fixed version : 5.4.23
CPE: cpe:/a:php:php
CVE: CVE-2013-6420
BID: 64225
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 10
Plugin: Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : openssl
vulnerabilities (USN-1451-1) (59289)
Name: Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : openssl vulnerabilities (USN-1451-1)
Family: Ubuntu Local Security Checks
Vulnerability Details
Description: Ivan Nestlerode discovered that the Cryptographic Message Syntax (CMS) and PKCS #7 implementations in OpenSSL returned early if RSA
decryption failed. This could allow an attacker to expose sensitive information via a Million Message Attack (MMA). (CVE-2012-0884)
It was discovered that an integer underflow was possible when using TLS 1.1, TLS 1.2, or DTLS with CBC encryption. This could allow a remote attacker to
cause a denial of service. (CVE-2012-2333).
Plugin Output:
- Installed package : libssl0.9.8_0.9.8o-5ubuntu1
Fixed package : libssl0.9.8_0.9.8o-5ubuntu1.7
CPE: p-cpe:/a:canonical:ubuntu_linux:libssl0.9.8
p-cpe:/a:canonical:ubuntu_linux:libssl1.0.0
p-cpe:/a:canonical:ubuntu_linux:openssl
cpe:/o:canonical:ubuntu_linux:10.04:-:lts
cpe:/o:canonical:ubuntu_linux:11.04
cpe:/o:canonical:ubuntu_linux:11.10
cpe:/o:canonical:ubuntu_linux:12.04:-:lts
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 11
cpe:/o:canonical:ubuntu_linux:8.04:-:lts
Plugin: Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : openssl vulnerability
(USN-1428-1) (58873)
Name: Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : openssl vulnerability (USN-1428-1)
Family: Ubuntu Local Security Checks
Vulnerability Details
Description: It was discovered that the fix for CVE-2012-2110 was incomplete for OpenSSL 0.9.8. A remote attacker could trigger this flaw in services
that used SSL to cause a denial of service or possibly execute arbitrary code with application privileges. Ubuntu 11.10 was not affected by this issue.
(CVE-2012-2131)
The original upstream fix for CVE-2012-2110 would cause BUF_MEM_grow_clean() to sometimes return the wrong error condition.
This update fixes the problem.
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 12
Solution: Update the affected libssl0.9.8 and / or libssl1.0.0 packages.
Plugin Output:
- Installed package : libssl0.9.8_0.9.8o-5ubuntu1
Fixed package : libssl0.9.8_0.9.8o-5ubuntu1.5
CPE: p-cpe:/a:canonical:ubuntu_linux:libssl0.9.8
p-cpe:/a:canonical:ubuntu_linux:libssl1.0.0
cpe:/o:canonical:ubuntu_linux:10.04:-:lts
cpe:/o:canonical:ubuntu_linux:11.04
cpe:/o:canonical:ubuntu_linux:11.10
cpe:/o:canonical:ubuntu_linux:8.04:-:lts
BID: 53212
Plugin: Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : openssl vulnerabilities
(USN-1424-1) (58808)
Name: Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : openssl vulnerabilities (USN-1424-1)
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 13
Family: Ubuntu Local Security Checks
Vulnerability Details
Description: It was discovered that OpenSSL could be made to dereference a NULL pointer when processing S/MIME messages. A remote attacker
could use this to cause a denial of service. These issues did not affect Ubuntu 8.04 LTS. (CVE-2006-7250, CVE-2012-1165)
Tavis Ormandy discovered that OpenSSL did not properly perform bounds checking when processing DER data via BIO or FILE functions. A remote
attacker could trigger this flaw in services that used SSL to cause a denial of service or possibly execute arbitrary code with application privileges.
(CVE-2012-2110).
Plugin Output:
- Installed package : libssl0.9.8_0.9.8o-5ubuntu1
Fixed package : libssl0.9.8_0.9.8o-5ubuntu1.4
CPE: p-cpe:/a:canonical:ubuntu_linux:libssl0.9.8
p-cpe:/a:canonical:ubuntu_linux:libssl1.0.0
cpe:/o:canonical:ubuntu_linux:10.04:-:lts
cpe:/o:canonical:ubuntu_linux:11.04
cpe:/o:canonical:ubuntu_linux:11.10
cpe:/o:canonical:ubuntu_linux:8.04:-:lts
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 14
First Discovered: Jun 4, 2014 22:25:05 EDT
Last Observed: Jun 4, 2014 22:25:05 EDT
Plugin: Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : openssl
vulnerabilities (USN-1357-1) (57887)
Name: Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : openssl vulnerabilities (USN-1357-1)
Family: Ubuntu Local Security Checks
Vulnerability Details
Description: It was discovered that the elliptic curve cryptography (ECC) subsystem in OpenSSL, when using the Elliptic Curve Digital Signature
Algorithm (ECDSA) for the ECDHE_ECDSA cipher suite, did not properly implement curves over binary fields. This could allow an attacker to determine
private keys via a timing attack. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1945)
Adam Langley discovered that the ephemeral Elliptic Curve Diffie-Hellman (ECDH) functionality in OpenSSL did not ensure thread safety while
processing handshake messages from clients. This could allow a remote attacker to cause a denial of service via out-of-order messages that violate the
TLS protocol. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04.
(CVE-2011-3210)
Nadhem Alfardan and Kenny Paterson discovered that the Datagram Transport Layer Security (DTLS) implementation in OpenSSL performed a MAC
check only if certain padding is valid. This could allow a remote attacker to recover plaintext. (CVE-2011-4108)
Antonio Martin discovered that a flaw existed in the fix to address CVE-2011-4108, the DTLS MAC check failure. This could allow a remote attacker to
cause a denial of service. (CVE-2012-0050)
Ben Laurie discovered a double free vulnerability in OpenSSL that could be triggered when the X509_V_FLAG_POLICY_CHECK flag is enabled.
This could allow a remote attacker to cause a denial of service. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu
11.04. (CVE-2011-4109)
It was discovered that OpenSSL, in certain circumstances involving ECDH or ECDHE cipher suites, used an incorrect modular reduction algorithm in
its implementation of the P-256 and P-384 NIST elliptic curves. This could allow a remote attacker to obtain the private key of a TLS server via multiple
handshake attempts. This issue only affected Ubuntu 8.04 LTS. (CVE-2011-4354)
Adam Langley discovered that the SSL 3.0 implementation in OpenSSL did not properly initialize data structures for block cipher padding. This could
allow a remote attacker to obtain sensitive information.
(CVE-2011-4576)
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 15
Andrew Chi discovered that OpenSSL, when RFC 3779 support is enabled, could trigger an assert when handling an X.509 certificate containing
certificate-extension data associated with IP address blocks or Autonomous System (AS) identifiers. This could allow a remote attacker to cause a denial
of service. (CVE-2011-4577)
Adam Langley discovered that the Server Gated Cryptography (SGC) implementation in OpenSSL did not properly handle handshake restarts.
This could allow a remote attacker to cause a denial of service.
(CVE-2011-4619)
Andrey Kulikov discovered that the GOST block cipher engine in OpenSSL did not properly handle invalid parameters. This could allow a remote attacker
to cause a denial of service via crafted data from a TLS client. This issue only affected Ubuntu 11.10. (CVE-2012-0027).
Plugin Output:
- Installed package : libssl0.9.8_0.9.8o-5ubuntu1
Fixed package : libssl0.9.8_0.9.8o-5ubuntu1.2
CPE: p-cpe:/a:canonical:ubuntu_linux:libssl0.9.8
p-cpe:/a:canonical:ubuntu_linux:libssl1.0.0
p-cpe:/a:canonical:ubuntu_linux:openssl
cpe:/o:canonical:ubuntu_linux:10.04:-:lts
cpe:/o:canonical:ubuntu_linux:10.10
cpe:/o:canonical:ubuntu_linux:11.04
cpe:/o:canonical:ubuntu_linux:11.10
cpe:/o:canonical:ubuntu_linux:8.04:-:lts
CVE: CVE-2011-1945, CVE-2011-3210, CVE-2011-4108, CVE-2011-4109, CVE-2011-4354, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2012-0027,
CVE-2012-0050
Crossref: OSVDB #74632, OSVDB #75230, OSVDB #77650, OSVDB #78186, OSVDB #78187, OSVDB #78188, OSVDB #78189, OSVDB #78190, OSVDB
#78191, OSVDB #78320, USN #1357-1
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 16
Plugin: OpenSSL Version Detection (57323)
Vulnerability Details
Description: The version of OpenSSL could be extracted from the web server's banner. Note that in many cases, security patches are backported and
the displayed version number does not show the patch level. Using it to identify vulnerable software is likely to lead to false detections.
Solution: n/a
Plugin Output:
Source : Server: Apache/1.3.33 (Unix) mod_ssl/2.8.22 OpenSSL/0.9.6m
Version (from banner) : 0.9.6m
CPE: cpe:/a:openssl:openssl
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 17
Plugin: OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
Ciphersuite Disabled Cipher Issue (51893)
Vulnerability Details
Description: The version of OpenSSL on the remote host has been shown to allow the use of disabled ciphers when resuming a session. This means that
an attacker that sees (e.g. by sniffing) the start of an SSL connection can manipulate the OpenSSL session cache to cause subsequent resumptions of
that session to use a disabled cipher chosen by the attacker.
Plugin Output:
The server allowed the following session over SSLv3 to be resumed as follows :
Session ID : 34bb781d0f58f9aef93df835442aa96893fb80bcf101794c6ac225d025d45c8e
Initial Cipher : TLS1_CK_RSA_WITH_AES_256_CBC_SHA (0x0035)
Resumed Cipher : SSL3_CK_RSA_DES_40_CBC_SHA (0x0008)
CPE: cpe:/a:openssl:openssl
CVE: CVE-2008-7270
BID: 45254
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 18
Exploitability Ease: No known exploits are available
Vulnerability Details
Description: The version of OpenSSL on the remote host has been shown to allow resuming session with a weaker cipher than was used when the
session was initiated. This means that an attacker that sees (i.e., by sniffing) the start of an SSL connection can manipulate the OpenSSL session cache to
cause subsequent resumptions of that session to use a weaker cipher chosen by the attacker.
Note that other SSL implementations may also be affected by this vulnerability.
Solution: Upgrade to OpenSSL 0.9.8q / 1.0.0.c or later, or contact your vendor for a patch.
Plugin Output:
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 19
The server allowed the following session over SSLv3 to be resumed as follows :
Session ID : 3b1d0489fd36812f1379e98e212931ef19c7ffd96e4333faefdbf9385aaccf01
Initial Cipher : TLS1_CK_RSA_WITH_AES_256_CBC_SHA (0x0035)
Resumed Cipher : SSL3_CK_RSA_DES_64_CBC_SHA (0x0009)
The server allowed the following session over TLSv1 to be resumed as follows :
Session ID : 409fb25d132a9573e8d4eec7ef29291540af9aaa0ede3a42b1c915f4ab82a2de
Initial Cipher : TLS1_CK_RSA_WITH_AES_256_CBC_SHA (0x0035)
Resumed Cipher : TLS1_CK_RSA_WITH_DES_CBC_SHA (0x0009)
CPE: cpe:/a:openssl:openssl
CVE: CVE-2010-4180
BID: 45164
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 20
Vulnerability Details
Description: Based on its response to a TLS request with a specially crafted server name extension, it seems that the remote service is using the
OpenSSL library to encrypt traffic.
Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS extensions (RFC 4366).
Solution: n/a
CPE: cpe:/a:openssl:openssl
OpenSSL Vulnerabilities
OpenSSL ChangeCipherSpec 21