Description: Multiple vulnerabilities were reported in OpenSSL. A remote user can decrypt TLS sessions in certain cases. A remote user can cause denial of service conditions on the target system.
A remote user can decrypt TLS sessions in certain cases by using a server that supports SSLv2 and EXPORT cipher suites as a Bleichenbacher RSA padding oracle [CVE-2016-0800]. This attack is known as a DROWN attack.
Systems with a private key used on another server for any protocol that allows SSLv2 connections are affected.
Systems running versions prior to 1.0.2a, 1.0.1m, 1.0.0r, and 0.9.8zf (released on March 19, 2015) can be exploited more readily.
Solution: The vendor has issued a fix (1.0.1s, 1.0.2g).
Test your website(s): https://drownattack.com/#check