当前位置: 代码迷 >> Java Web开发 >> nessus扫描出来的漏洞(26928与42873)不知怎么规避
  详细解决方案

nessus扫描出来的漏洞(26928与42873)不知怎么规避

热度:372   发布时间:2016-04-17 10:53:05.0
nessus扫描出来的漏洞(26928与42873)不知如何规避
解释如下,不知如何规避,请高手指点,多谢
42873解释:
Synopsis: The remote service supports the use of medium strength SSL ciphers.

Description
The remote host supports the use of SSL ciphers that offer medium
strength encryption, which we currently regard as those with key 
lengths at least 56 bits and less than 112 bits.

Note: This is considerably easier to exploit if the attacker is on the
same physical network.

Solution
Reconfigure the affected application if possible to avoid use of
medium strength ciphers.

Risk Factor: Medium

CVSS Base Score
 4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

Plugin Output
Here is the list of medium strength SSL ciphers supported by the remote server :

  Medium Strength Ciphers (>= 56-bit and < 112-bit key)
  SSLv3
  EDH-RSA-DES-CBC-SHA Kx=DH Au=RSA Enc=DES(56) Mac=SHA1  
  DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1  
  TLSv1
  EDH-RSA-DES-CBC-SHA Kx=DH Au=RSA Enc=DES(56) Mac=SHA1  
  DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1  

The fields above are :

  {OpenSSL ciphername}
  Kx={key exchange}
  Au={authentication}
  Enc={symmetric encryption method}
  Mac={message authentication code}
  {export flag}

26928:
Synopsis: The remote service supports the use of weak SSL ciphers.

Description
The remote host supports the use of SSL ciphers that offer either weak
encryption or no encryption at all.

Note: This is considerably easier to exploit if the attacker is on the
same physical network.

Solution
Reconfigure the affected application if possible to avoid use of weak
ciphers.

See Also
http://www.openssl.org/docs/apps/ciphers.html

Risk Factor: Medium

CVSS Base Score
 4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

Plugin Output
Here is the list of weak SSL ciphers supported by the remote server :

  Low Strength Ciphers (< 56-bit key)
  SSLv3
  EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export  
  EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export  
  EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export  
  TLSv1
  EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export  
  EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export  
  EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export  

The fields above are :

  {OpenSSL ciphername}
  Kx={key exchange}
  Au={authentication}
  Enc={symmetric encryption method}
  Mac={message authentication code}
  {export flag}

Xref
CWE:327
CWE:326
CWE:753
CWE:803
CWE:720



------解决方案--------------------
意思是服务器允许客户器端用低强度的SSL加密等级来连接服务器,这样相当于安全短板。

这个应该可以修改配置来完成,看你服务器端是什么设备或系统负责建立SSL连接的,比如是Apache或者是SSL-VPN网关 啥的,根据具体设备或系统去Google吧。