5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.8 Medium
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
72.8%
OpenSSL is prone to an information disclosure vulnerability.
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:openssl:openssl";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.104838");
script_version("2023-10-26T05:07:17+0000");
script_tag(name:"last_modification", value:"2023-10-26 05:07:17 +0000 (Thu, 26 Oct 2023)");
script_tag(name:"creation_date", value:"2023-07-17 06:30:34 +0000 (Mon, 17 Jul 2023)");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:N");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2023-07-27 13:02:00 +0000 (Thu, 27 Jul 2023)");
script_cve_id("CVE-2023-2975");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
script_tag(name:"solution_type", value:"VendorFix");
script_name("OpenSSL Information Disclosure Vulnerability (20230714) - Linux");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2023 Greenbone AG");
script_family("General");
script_dependencies("gb_openssl_consolidation.nasl", "os_detection.nasl");
script_mandatory_keys("openssl/detected", "Host/runs_unixoide");
script_tag(name:"summary", value:"OpenSSL is prone to an information disclosure vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The AES-SIV cipher implementation contains a bug that causes it
to ignore empty associated data entries which are unauthenticated as a consequence.");
script_tag(name:"impact", value:"Applications that use the AES-SIV algorithm and want to
authenticate empty data entries as associated data can be misled by removing, adding or reordering
such empty entries as these are ignored by the OpenSSL implementation. The vendor is currently
unaware of any such applications.");
script_tag(name:"affected", value:"OpenSSL version 3.0 and 3.1.");
script_tag(name:"solution", value:"Update to version 3.0.10, 3.1.2 or later.");
script_xref(name:"URL", value:"https://www.openssl.org/news/secadv/20230714.txt");
script_xref(name:"URL", value:"https://www.openssl.org/news/vulnerabilities-3.0.html#CVE-2023-2975");
script_xref(name:"URL", value:"https://www.openssl.org/news/vulnerabilities-3.1.html#CVE-2023-2975");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if (isnull(port = get_app_port(cpe: CPE)))
exit(0);
if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
exit(0);
version = infos["version"];
location = infos["location"];
if (version_in_range(version: version, test_version: "3.0.0", test_version2: "3.0.9")) {
report = report_fixed_ver(installed_version: version, fixed_version: "3.0.10", install_path: location);
security_message(port: port, data: report);
exit(0);
}
if (version_in_range(version: version, test_version: "3.1.0", test_version2: "3.1.1")) {
report = report_fixed_ver(installed_version: version, fixed_version: "3.1.2", install_path: location);
security_message(port: port, data: report);
exit(0);
}
exit(99);
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.8 Medium
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
72.8%