|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200510-11] OpenSSL: SSL 2.0 protocol rollback Vulnerability Scan
Vulnerability Scan Summary OpenSSL: SSL 2.0 protocol rollback
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200510-11
(OpenSSL: SSL 2.0 protocol rollback)
Applications setting the SSL_OP_MSIE_SSLV2_RSA_PADDING option (or
the SSL_OP_ALL option, that implies it) can be forced by a third-party
to fallback to the less secure SSL 2.0 protocol, even if both parties
support the more secure SSL 3.0 or TLS 1.0 protocols.
Impact
A man-in-the-middle attacker can weaken the encryption used to
communicate between two parties, potentially revealing sensitive
information.
Workaround
If possible, disable the use of SSL 2.0 in all OpenSSL-enabled
applications.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2969
http://www.openssl.org/news/secadv_20051011.txt
Solution:
All OpenSSL users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose dev-libs/openssl
Threat Level: Low
Click HERE for more information and discussions on this network vulnerability scan.
|