TLS Protocol Session Renegotiation Security Vulnerability

1 post / 0 new
#1 Fri, 12/05/2014 - 12:03
uwe@comproso.com

TLS Protocol Session Renegotiation Security Vulnerability

Hi,

I am currently working on getting a server with CentOS 5.11 through PCI certification.

I get : TLS Protocol Session Renegotiation Security Vulnerability

I don't know what to do about it and it only effects the webmin/virtualmin login (usermin port is closed). All SSL settings are set as in https://www.virtualmin.com/documentation/security/pci recommended. I have checked on redhat and here is what they say : https://access.redhat.com/articles/20490 which does not help much as there seems to be no solution available right now. As additional info, we are using two factor authentication on top of a SSL connection.

Any hints on what to do?

Here the scan report: THREAT REFERENCE

Summary: TLS Protocol Session Renegotiation Security Vulnerability

Risk: High (3) Port: 47110/tcp Protocol: tcp Threat ID: misc_opensslrenegotiation

Details: Multiple Vendor TLS Protocol Session Renegotiation Security Vulnerability 06/11/12 CVE 2009-3555 Multiple vendors TLS protocol implementations are prone to a security vulnerability related to the session-renegotiation process which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context.

Information From Target: Service: 47110:TCP Session Renegotiation succeeded on 47110:TCP and secure renegotiation did not succeed