Lucene search

K
nessusTenable9800.PRM
HistoryNov 18, 2016 - 12:00 a.m.

OpenSSL 1.1.0 < 1.1.0c Multiple Vulnerabilities

2016-11-1800:00:00
Tenable
www.tenable.com
9

According to its banner, the version of OpenSSL on the remote host is version 1.1.0 prior to 1.1.0c and is affected by multiple vulnerabilities :

  • A NULL pointer dereference flaw exists in the ‘asn1_item_embed_d2i()’ function in ‘crypto/asn1/tasn_dec.c’ that is triggered when handling the ASN.1 CHOICE type. This may allow a remote attacker to crash a process linked against the library. (CVE-2016-7053)
  • An overflow condition exists in the ‘chacha20_poly1305_cipher()’ function in ‘crypto/evp/e_chacha20_poly1305.c’ that is triggered when handling TLS connections using *-CHACHA20-POLY1305 ciphersuites. This may allow a remote attacker to cause a heap-based buffer overflow and crash a process linked against the library. (CVE-2016-7054)
  • A carry propagating flaw exists in the Broadwell-specific Montgomery multiplication procedure that leads to incorrect results. This may result in transient authentication and key negotiation failures, reproducible erroneous outcomes of public-key operations, or potentially attacks against ECDH key negotiation in very atypical cases. (CVE-2016-7055)
Binary data 9800.prm
VendorProductVersionCPE
opensslopensslcpe:/a:openssl:openssl