First published: Thu Dec 02 2010(Updated: )
OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | >=1.0.0<1.0.0c | |
OpenSSL OpenSSL | <0.9.8q | |
Fedoraproject Fedora | =13 | |
Fedoraproject Fedora | =14 | |
Debian Debian Linux | =5.0 | |
Canonical Ubuntu Linux | =10.10 | |
Canonical Ubuntu Linux | =9.04 | |
Canonical Ubuntu Linux | =8.04 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =6.06 | |
SUSE Linux Enterprise Desktop | =11-sp1 | |
openSUSE openSUSE | =11.1 | |
SUSE Linux Enterprise Server | =9 | |
openSUSE openSUSE | =11.4 | |
openSUSE openSUSE | =11.2 | |
openSUSE openSUSE | =11.3 | |
SUSE Linux Enterprise Desktop | =10-sp3 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =10-sp3 | |
SUSE Linux Enterprise | =11.0-sp1 | |
F5 Nginx | <0.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.