First published: Tue Oct 18 2005(Updated: )
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | =0.9.7 | |
OpenSSL OpenSSL | =0.9.7a | |
OpenSSL OpenSSL | =0.9.7b | |
OpenSSL OpenSSL | =0.9.7c | |
OpenSSL OpenSSL | =0.9.7d | |
OpenSSL OpenSSL | =0.9.7e | |
OpenSSL OpenSSL | =0.9.7f | |
OpenSSL OpenSSL | =0.9.7g | |
OpenSSL OpenSSL | =0.9.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.