Summary
The host is running NASL and is prone to Security Bypass vulnerability.
Impact
Successful exploitation could allow remote attackers to bypass the certificate validation checks and can cause spoofing attacks via signature checks with SSL/TLS.
Impact Level: System/Application
Solution
Apply Patch
http://cvs.fedoraproject.org/viewvc/rpms/libnasl/F-10/libnasl.spec?r1=1.16&r2=1.17
*********
NOTE: Please ignore the warning, if patch is applied.
*********
Insight
The flaw is due to improper validation of return value in nasl/nasl_crypto2.c file from DSA_do_verify function of OpenSSL.
Affected
Nessus Attack Scripting Language (NASL) version 2.2.11 and prior on Linux.
References
Severity
Classification
-
CVE CVE-2008-5077, CVE-2009-0125 -
CVSS Base Score: 5.8
AV:N/AC:M/Au:N/C:N/I:P/A:P
Related Vulnerabilities