DROWN is a serious vulnerability that affects HTTPS and other services that rely on SSL and TLS. This vulnerability allows attackers to break the encryption and read or steal sensitive communications.
Who is vulnerable ?:
A server is vulnerable to DROWN if:
- It allows SSLv2 connections.
- Its private key is used on any other server that allows SSLv2 connections, even for another protocol.
Other less critical OpenSSL vulnerabilities have been discovered and are explained here:
Specific to Operating System:
Please make sure to verify if a patched version of OpenSSL has been released for your Operating System version before updating it:
Red Hat and CentOS
While Ubuntu is not afftected by CVE-2016-0800, it is affected by CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0798, CVE-2016-0799 and the OpenSSL package should be updated:
Windows server Microsoft IIS
IIS versions 7.0 and above should have SSLv2 disabled by default. IIS versions below 7.0 are no longer supported by Microsoft and should be upgraded to supported versions.
On CentOS and Red Hat Enterprise Linux
yum clean all
yum update openssl
On Ubuntu and Debian
sudo apt-get update
sudo apt-get install openssl
We suggest that you subscribe to your OS notification system at the following URLs:
Red Hat - RHSA-announce (http://www.redhat.com/mailman/listinfo/rhsa-announce)
CentOS - CentOS-announce (https://lists.centos.org/mailman/listinfo/centos-announce)
Ubuntu - ubuntu-security-announce (https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce)
Debian - debian-security-announce (https://lists.debian.org/debian-security-announce/)