Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Synopsis: The remote service supports the use of medium strength SSL ciphers.
- Description
- The remote host supports the use of SSL ciphers that offer medium
- strength encryption, which we currently regard as those with key
- lengths at least 56 bits and less than 112 bits.
- Note: This is considerably easier to exploit if the attacker is on the
- same physical network.
- Solution
- Reconfigure the affected application if possible to avoid use of
- medium strength ciphers.
- Risk Factor: Medium
- CVSS Base Score
- 4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
- Plugin Output
- Here is the list of medium strength SSL ciphers supported by the remote server :
- Medium Strength Ciphers (>= 56-bit and < 112-bit key)
- SSLv3
- EDH-RSA-DES-CBC-SHA Kx=DH Au=RSA Enc=DES(56) Mac=SHA1
- DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1
- TLSv1
- EDH-RSA-DES-CBC-SHA Kx=DH Au=RSA Enc=DES(56) Mac=SHA1
- DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1
- The fields above are :
- {OpenSSL ciphername}
- Kx={key exchange}
- Au={authentication}
- Enc={symmetric encryption method}
- Mac={message authentication code}
- {export flag}
- Plugin Publication Date: 2009/11/23
Add Comment
Please, Sign In to add comment