Описание
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
A flaw was found in the way OpenSSL handled fragmented handshake packets. A man-in-the-middle attacker could use this flaw to force a TLS/SSL server using OpenSSL to use TLS 1.0, even if both the client and the server supported newer protocol versions.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | openssl | Not affected | ||
Red Hat Enterprise Linux 5 | openssl097a | Not affected | ||
Red Hat Enterprise Linux 6 | openssl098e | Not affected | ||
Red Hat Enterprise Linux 7 | openssl098e | Not affected | ||
Red Hat JBoss Enterprise Application Platform 5 | openssl | Not affected | ||
Red Hat JBoss Enterprise Application Platform 6 | openssl | Not affected | ||
Red Hat JBoss Enterprise Web Server 1 | openssl | Not affected | ||
Red Hat JBoss Enterprise Web Server 1 | others | Not affected | ||
Red Hat JBoss Enterprise Web Server 2 | openssl | Not affected | ||
Red Hat Enterprise Linux 6 | openssl | Fixed | RHSA-2014:1052 | 13.08.2014 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 bef ...
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
Уязвимость программного обеспечения OpenSSL, позволяющая удаленному злоумышленнику нарушить защищаемой информации
EPSS
4.3 Medium
CVSS2