7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.577 Medium
EPSS
Percentile
97.4%
Background:
Recently the OpenSSL official release of a wide range of remote anonymous denial of service vulnerability, exploit code: SSL-Death Alert”, vulnerability ID: CVE-2 0 1 6-8 6 1 0, that“OpenSSL Red Alert”vulnerability, exploit the vulnerability the attacker may be too much of a connection to repeatedly send a lot of overlap warnings in the package, so the service or process into a meaningless cycle, thereby resulting in the occupation of down services or processes 1 0 0% CPU utilization, resulting in a denial of service.
The vulnerability affects the majority of OpenSSL versions affected also include the use of OpenSSL in the repository services, such as HTTPS, SSL or TLS Protocol services of the Nginx one.
In view of this, we strongly recommend that you as soon as possible to confirm your system is affected, such as the affected, Please as soon as possible to upgrade repair.
The vulnerability details are as follows:
The [risk overview]
OpenSSL 1.1.0 a version of OpenSSL for SSL/TLS Protocol handshake process implementation, allows the client to repeatedly send the package “SSL3_RT_ALERT” -> “SSL3_AL_WARNING” type plaintext undecided vigilante. report package, and OpenSSL in implementation encountered undefined vigilante. report package still choose to ignore and continue processing the next content of the communication, if any. An attacker can easily exploit the flaw in a message packaged in a large number of undefined Type Warning in the package, so the service or process into a meaningless cycle, thereby resulting in the occupation of down services or processes 1 0 0% CPU usage. The statem/statem. c call to realloc does not consider the memory block is moved, the remote attacker by constructing a TLS session, can cause a denial of service or arbitrary code execution.
【Impact version】
The configuration file search path:
echo “/usr/local/ssl/lib/” >> /etc/ld. so. conf
! [](/Article/UploadPic/2016-10/2 0 1 6 1 0 2 9 1 7 1 0 1 4 9 8 8. png? www. myhack58. com)
View after installation of the latest version:
openssl version
! [](/Article/UploadPic/2016-10/2 0 1 6 1 0 2 9 1 7 1 0 1 4 6 2 1. png? www. myhack58. com)
openssl version-a
! [](/Article/UploadPic/2016-10/2 0 1 6 1 0 2 9 1 7 1 0 1 4 1 3 6. png? www. myhack58. com)
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.577 Medium
EPSS
Percentile
97.4%