First published: Thu Dec 02 2010(Updated: )
OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | <0.9.8q | |
OpenSSL libcrypto | >=1.0.0<1.0.0c | |
Fedoraproject Fedora | =13 | |
Fedoraproject Fedora | =14 | |
Debian GNU/Linux | =5.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =9.04 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
openSUSE | =11.1 | |
openSUSE | =11.2 | |
openSUSE | =11.3 | |
openSUSE | =11.4 | |
SUSE Linux Enterprise Server | =11.0-sp1 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp3 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp4 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp1 | |
SUSE Linux Enterprise Server | =9 | |
SUSE Linux Enterprise Server | =10-sp3 | |
SUSE Linux Enterprise Server | =10-sp4 | |
f5 nginx | <0.9.2 | |
Fedora | =13 | |
Fedora | =14 | |
Debian | =5.0 | |
Ubuntu | =10.10 | |
Ubuntu | =9.04 | |
Ubuntu | =8.04 | |
Ubuntu | =10.04 | |
Ubuntu | =6.06 | |
F5 NGINX App Protect | <0.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4180 is classified as a high-severity vulnerability due to the potential for data interception and manipulation.
To mitigate CVE-2010-4180, upgrade OpenSSL to a version later than 0.9.8q or 1.0.0c.
Affected versions include OpenSSL prior to 0.9.8q and 1.0.x before 1.0.0c.
CVE-2010-4180 can be exploited by remote attackers who can sniff network traffic.
CVE-2010-4180 affects the handling of cipher suites in the session cache allowing for potential downgrades.