Описание
ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2 ciphers that were disabled on the server. This could result in weak SSLv2 ciphers being used for SSLv2 connections, making them vulnerable to man-in-the-middle attacks.
Отчет
This security flaw can only be exploited when a malicious client negotiates SSLv2 ciphers and completes a SSLv2 handshake. This flaw cannot be actively exploited by a Man-In-The-Middle attacker. All versions of OpenSSL shipped with Red Hat Enterprise Linux enable SSLv2 protocol, but disable SSLv2 ciphers by default (in Red Hat Enterprise Linux 6 and later), therefore are vulnerable to this flaw. Red Hat Product Security has rated this issue as having Low security impact, a future update may address this flaw. SSLv2 suffers from a number of security flaws allowing attackers to capture and alter information passed between a client and the server. Therefore we strongly recommend that SSLv2 should be disabled on all the SSL/TLS servers.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | openssl097a | Affected | ||
Red Hat Enterprise Linux Extended Update Support 6.7 | guest-images | Affected | ||
Red Hat Enterprise Linux Extended Update Support 7.2 | rhel-guest-image | Affected | ||
Red Hat JBoss Enterprise Application Platform 5 | openssl | Will not fix | ||
Red Hat JBoss Enterprise Web Server 1 | openssl | Will not fix | ||
Red Hat JBoss Enterprise Web Server 3 | openssl | Affected | ||
Red Hat Enterprise Linux 4 Extended Lifecycle Support | openssl | Fixed | RHSA-2016:0306 | 01.03.2016 |
Red Hat Enterprise Linux 5 | openssl | Fixed | RHSA-2016:0302 | 01.03.2016 |
Red Hat Enterprise Linux 5.6 Long Life | openssl | Fixed | RHSA-2016:0304 | 01.03.2016 |
Red Hat Enterprise Linux 5.9 Long Life | openssl | Fixed | RHSA-2016:0304 | 01.03.2016 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.8 Medium
CVSS2
Связанные уязвимости
ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f d ...
ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
Уязвимость библиотеки OpenSSL, позволяющая нарушителю взломать криптографический механизм защиты
EPSS
5.8 Medium
CVSS2