Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2003:035: openssl Vulnerability Scan


Vulnerability Scan Summary
Check for the version of the openssl package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2003:035 (openssl).


Researchers discovered a timing-based attack on RSA keys that OpenSSL is
generally vulnerable to, unless RSA blinding is enabled. Patches from the
OpenSSL team have been applied to turn RSA blinding on by default.
An extension of the 'Bleichenbacher attack' on RSA with PKS #1 v1.5 padding as
used in SSL 3.0 and TSL 1.0 was also created by Czech cryptologists Vlastimil
Klima, Ondrej Pokorny, and Tomas Rosa. This attack requires the attacker to open
millions of SSL/TLS connections to the server they are attacking. This is done
because the server's behaviour when faced with specially crafted RSA ciphertexts
can reveal information that would in effect allow the attacker to perform a
single RSA private key operation on a ciphertext of their choice, using the
server's RSA key. Despite this, the server's RSA key is not compromised at any
time. Patches from the OpenSSL team modify SSL/TLS server behaviour to avoid
this vulnerability.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:035
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.