Lucene search

K
nessusThis script is Copyright (C) 2012-2023 Tenable Network Security, Inc.OPENSSL_0_9_8U.NASL
HistoryApr 02, 2012 - 12:00 a.m.

OpenSSL < 0.9.8u Multiple Vulnerabilities

2012-04-0200:00:00
This script is Copyright (C) 2012-2023 Tenable Network Security, Inc.
www.tenable.com
21

According to its banner, the remote web server uses an OpenSSL version prior to 0.9.8u. As such, it is reportedly affected by the following vulnerabilities :

  • An error exists in the function ‘mime_hdr_cmp’ that could allow a NULL pointer to be dereferenced when parsing certain MIME headers. (CVE-2006-7250)

  • The fix for CVE-2011-4619 was not complete.

  • An error exists in the Cryptographic Message Syntax (CMS) and PKCS #7 implementation such that data can be decrypted using Million Message Attack (MMA) adaptive chosen cipher text attack. (CVE-2012-0884)

  • An error exists in the function ‘mime_param_cmp’ in the file ‘crypto/asn1/asn_mime.c’ that can allow a NULL pointer to be dereferenced when handling certain S/MIME content. (CVE-2012-1165)

Note that SSL/TLS applications are not necessarily affected, but those using CMS, PKCS #7 and S/MIME decryption operations are.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(58564);
  script_version("1.13");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/08/22");

  script_cve_id(
    "CVE-2006-7250",
    "CVE-2011-4619",
    "CVE-2012-0884",
    "CVE-2012-1165"
  );
  script_bugtraq_id(51281, 52181, 52428, 52764);

  script_name(english:"OpenSSL < 0.9.8u Multiple Vulnerabilities");
  script_summary(english:"Does a banner check");

  script_set_attribute(
    attribute:"synopsis",
    value:"The remote host may be affected by multiple vulnerabilities."
  );
  script_set_attribute(
    attribute:"description",
    value:
"According to its banner, the remote web server uses an OpenSSL 
version prior to 0.9.8u.  As such, it is reportedly affected by
the following vulnerabilities :

  - An error exists in the function 'mime_hdr_cmp' that
    could allow a NULL pointer to be dereferenced when
    parsing certain MIME headers. (CVE-2006-7250)

  - The fix for CVE-2011-4619 was not complete.

  - An error exists in the Cryptographic Message Syntax
    (CMS) and PKCS #7 implementation such that data can
    be decrypted using Million Message Attack (MMA)
    adaptive chosen cipher text attack. (CVE-2012-0884)

  - An error exists in the function 'mime_param_cmp' in the
    file 'crypto/asn1/asn_mime.c' that can allow a NULL
    pointer to be dereferenced when handling certain S/MIME
    content. (CVE-2012-1165)

Note that SSL/TLS applications are not necessarily affected, but
those using CMS, PKCS #7 and S/MIME decryption operations are."
  );
  script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=openssl-dev&amp;m=115685408414194&amp;w=2");
  script_set_attribute(attribute:"see_also", value:"https://www.openssl.org/news/secadv/20120312.txt");
  script_set_attribute(attribute:"see_also", value:"https://www.openssl.org/news/changelog.html");
  script_set_attribute(attribute:"see_also", value:"https://www.openwall.com/lists/oss-security/2012/03/13/2");
  script_set_attribute(attribute:"see_also", value:"https://www.openwall.com/lists/oss-security/2012/02/28/14");
   # https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=dc95c53c6f3fc9007fea9376d02f7bd82d2a0fb4
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?82fc5c0b");
  script_set_attribute(attribute:"solution", value:"Upgrade to OpenSSL 0.9.8u or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-0884");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2006/08/30");
  script_set_attribute(attribute:"patch_publication_date", value:"2012/02/23");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/04/02");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:openssl:openssl");
  script_set_attribute(attribute:"agent", value:"all");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2012-2023 Tenable Network Security, Inc.");

  script_dependencies("openssl_version.nasl", "openssl_nix_installed.nbin", "openssl_win_installed.nbin");
  script_require_keys("installed_sw/OpenSSL");

  exit(0);
}

include('vcf.inc');
include('vcf_extras_openssl.inc');

var app_info = vcf::combined_get_app_info(app:'OpenSSL');

vcf::check_all_backporting(app_info:app_info);

var constraints = [{ 'min_version' : '0.0.0', 'fixed_version' : '0.9.8u'}];

vcf::openssl::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
VendorProductVersionCPE
opensslopensslcpe:/a:openssl:openssl