Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xhj2-g5qf-66wr

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.

EPSS

Процентиль: 54%
0.00317
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.

redhat
почти 15 лет назад

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.

nvd
больше 13 лет назад

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.

debian
больше 13 лет назад

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when ...

suse-cvrf
больше 11 лет назад

Security update for OpenSSL

EPSS

Процентиль: 54%
0.00317
Низкий