Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0224

Опубликовано: 05 июн. 2014
Источник: redhat
CVSS2: 5.8

Описание

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6guest-imagesNot affected
Red Hat Enterprise Linux Extended Update Support 5.6opensslAffected
Red Hat Enterprise Virtualization 3mingw-virt-viewerNot affected
Red Hat JBoss Enterprise Application Platform 5opensslAffected
Red Hat JBoss Enterprise Application Platform 6opensslAffected
Red Hat JBoss Enterprise Web Server 1opensslWill not fix
Red Hat JBoss Enterprise Web Server 1othersNot affected
Red Hat Enterprise Linux 4 Extended Lifecycle SupportopensslFixedRHSA-2014:062705.06.2014
Red Hat Enterprise Linux 5opensslFixedRHSA-2014:062405.06.2014
Red Hat Enterprise Linux 5openssl097aFixedRHSA-2014:062605.06.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-841
https://bugzilla.redhat.com/show_bug.cgi?id=1103586openssl: SSL/TLS MITM vulnerability

5.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 11 лет назад

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

CVSS3: 7.4
nvd
больше 11 лет назад

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

CVSS3: 7.4
debian
больше 11 лет назад

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h d ...

CVSS3: 7.4
github
больше 3 лет назад

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

oracle-oval
больше 11 лет назад

ELSA-2014-0680: openssl098e security update (IMPORTANT)

5.8 Medium

CVSS2