Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-5095

Опубликовано: 20 июн. 2012
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS2: 4

Описание

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.

РелизСтатусПримечание
devel

not-affected

hardy

not-affected

code not compiled
lucid

not-affected

code not compiled
natty

not-affected

code not compiled
oneiric

not-affected

1.0.0e-2ubuntu4.6
precise

not-affected

upstream

not-affected

code not compiled

Показывать по

РелизСтатусПримечание
devel

not-affected

code not compiled
hardy

DNE

lucid

DNE

natty

DNE

oneiric

not-affected

code not compiled
precise

not-affected

code not compiled
upstream

needs-triage

Показывать по

EPSS

Процентиль: 54%
0.00317
Низкий

4 Medium

CVSS2

Связанные уязвимости

redhat
почти 15 лет назад

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.

nvd
больше 13 лет назад

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.

debian
больше 13 лет назад

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when ...

github
больше 3 лет назад

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.

suse-cvrf
больше 11 лет назад

Security update for OpenSSL

EPSS

Процентиль: 54%
0.00317
Низкий

4 Medium

CVSS2