Описание
OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 3 | openssl | Will not fix | ||
Red Hat Enterprise Linux 4 | openssl096b | Will not fix | ||
Red Hat Enterprise Linux 5 | openssl097a | Will not fix | ||
Red Hat Enterprise Linux 6 | openssl098e | Will not fix | ||
Red Hat Enterprise Linux 4 | openssl | Fixed | RHSA-2010:0977 | 13.12.2010 |
Red Hat Enterprise Linux 5 | openssl | Fixed | RHSA-2010:0978 | 13.12.2010 |
Red Hat Enterprise Linux 6 | openssl | Fixed | RHSA-2010:0979 | 13.12.2010 |
Red Hat JBoss Web Server 1.0 | Fixed | RHSA-2011:0896 | 22.06.2011 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_R ...
OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
EPSS
4.3 Medium
CVSS2