Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-3555

Опубликовано: 09 нояб. 2009
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.8

Описание

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

РелизСтатусПримечание
dapper

released

2.0.55-4ubuntu2.9
devel

released

2.2.14-2ubuntu1
hardy

released

2.2.8-1ubuntu0.14
intrepid

released

2.2.9-7ubuntu3.5
jaunty

released

2.2.11-2ubuntu2.5
karmic

released

2.2.12-1ubuntu2.1
lucid

released

2.2.14-2ubuntu1
upstream

released

2.2.14-2

Показывать по

РелизСтатусПримечание
dapper

ignored

devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

ignored

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

2.10.5-1ubuntu1
hardy

DNE

intrepid

ignored

end of life, was needed
jaunty

ignored

karmic

ignored

lucid

ignored

upstream

released

2.10.0

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

3.12.6-0ubuntu2
hardy

released

3.12.6-0ubuntu0.8.04.1
intrepid

ignored

end of life, was needed
jaunty

released

3.12.6-0ubuntu0.9.04.1
karmic

released

3.12.6-0ubuntu0.9.10.1
lucid

released

3.12.6-0ubuntu2
upstream

released

3.12.6

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

6b18~pre4-0ubuntu1
hardy

released

6b11-2ubuntu2.2
intrepid

released

6b12-0ubuntu6.7
jaunty

released

6b14-1.4.1-0ubuntu13
karmic

released

6b16-1.6.1-3ubuntu3
lucid

not-affected

6b18~pre4-0ubuntu1
upstream

released

6b18~pre4-1

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

6b18-1.8.3-1ubuntu3
hardy

DNE

intrepid

DNE

karmic

not-affected

6b18-1.8.4-0ubuntu1~9.10.1
lucid

not-affected

6b18-1.8.3-0ubuntu1~10.04.1
maverick

released

6b18-1.8.2-4ubuntu1
upstream

released

6b22

Показывать по

РелизСтатусПримечание
dapper

released

0.9.8a-7ubuntu0.12
devel

not-affected

0.9.8o-1ubuntu3
hardy

released

0.9.8g-4ubuntu3.10
intrepid

ignored

end of life, was needed
jaunty

released

0.9.8g-15ubuntu3.5
karmic

released

0.9.8g-16ubuntu3.2
lucid

released

0.9.8k-7ubuntu8.1
upstream

released

0.9.8m

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

released

6.22-0ubuntu1~9.04.1
jaunty

released

6.22-0ubuntu1~9.04.1
karmic

released

6.22-0ubuntu1~9.10.1
lucid

released

6.22-0ubuntu1~10.04
maverick

released

6.22-0ubuntu1~10.10
upstream

released

6.22

Показывать по

EPSS

Процентиль: 88%
0.04027
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

nvd
больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

debian
больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as us ...

github
около 3 лет назад

Apache Tomcat affected by vulnerability in TLS and SSL protocol

oracle-oval
около 15 лет назад

ELSA-2010-0165: nss security update (MODERATE)

EPSS

Процентиль: 88%
0.04027
Низкий

5.8 Medium

CVSS2

Уязвимость CVE-2009-3555