Howdy,

To test the security of my proprietary HTTPS server, built with OpenSSL library version 0.9.7d, I ran Nessus version 2.2 against it and it reported the following alert (as issued by Nessus plug-in ID 11875, described at: http://cgi.nessus.org/plugins/dump.php3?id=11875 ):

----------------------------------------
The remote host seem to be running a version of OpenSSL which is older than 0.9.6k or 0.9.7c.


There is a heap corruption bug in this version which might be exploited by an
attacker to gain a shell on this host.


Solution : If you are running OpenSSL, Upgrade to version 0.9.6k or 0.9.7c or newer
Risk factor : High
----------------------------------------


However, as mentioned above, the version of OpenSSL I am using is in fact newer than what Nessus suggests it to be (although just barely newer than 0.9.7c).

---> My question is, why does Nessus report this alert and, gulp, should I be worried about the associated “shell access” possibility?

More specifically, does this mean that one of the ASN.1 parsing problems described in CAN-2003-0543, CAN-2003-0544, and CAN-2003-0545 occurred somewhere in the OpenSSL library?

Also, I am not sure if this matters or not, but my HTTPS server does not require clients to provide their certificates so at server initialization time I invoke (among the other various start up calls):

  SSL_CTX_set_verify( sslCtx, SSL_VERIFY_NONE, NULL );

As I am about to release my product, I do not want to update the version of the OpenSSL library I am using but, of course, if there is a legitimate security concern here I will have to do so.

Any help and advice you can provide would be greatly appreciated.

Thanks,

- Andrew

The complete source to the Nessus plug-in is available at:
http://cvsweb.nessus.org/cgi-bin/cvsweb.cgi/~checkout~/nessus-plugins/scripts/ssltest.nasl?content-type=text/plain

_________________________________________________________________
Express yourself instantly with MSN Messenger! Download today - it's FREE! http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to