Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0224

Опубликовано: 05 июн. 2014
Источник: redhat
CVSS2: 5.8

Описание

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6guest-imagesNot affected
Red Hat Enterprise Virtualization 3mingw-virt-viewerNot affected
Red Hat JBoss Enterprise Application Platform 5opensslAffected
Red Hat JBoss Enterprise Application Platform 6opensslAffected
Red Hat JBoss Enterprise Web Server 1opensslWill not fix
Red Hat Enterprise Linux 4 Extended Lifecycle SupportopensslFixedRHSA-2014:062705.06.2014
Red Hat Enterprise Linux 5opensslFixedRHSA-2014:062405.06.2014
Red Hat Enterprise Linux 5openssl097aFixedRHSA-2014:062605.06.2014
Red Hat Enterprise Linux 5.6 Long LifeopensslFixedRHSA-2014:062705.06.2014
Red Hat Enterprise Linux 5.9 Extended Update SupportopensslFixedRHSA-2014:062705.06.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-841
https://bugzilla.redhat.com/show_bug.cgi?id=1103586openssl: SSL/TLS MITM vulnerability

5.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.4
ubuntu
почти 12 лет назад

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

CVSS3: 7.4
nvd
почти 12 лет назад

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

CVSS3: 7.4
debian
почти 12 лет назад

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h d ...

CVSS3: 7.4
github
почти 4 года назад

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

oracle-oval
больше 11 лет назад

ELSA-2014-0680: openssl098e security update (IMPORTANT)

5.8 Medium

CVSS2