First published: Thu Dec 02 2010(Updated: )
OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL | =0.9.7-beta5 | |
OpenSSL | =0.9.7-beta3 | |
OpenSSL | =0.9.5a-beta2 | |
OpenSSL | =0.9.7-beta6 | |
OpenSSL | =0.9.8b | |
OpenSSL | =0.9.7l | |
OpenSSL | =0.9.6i | |
OpenSSL | =0.9.8m | |
OpenSSL | =0.9.3 | |
OpenSSL | =0.9.8c | |
OpenSSL | =0.9.7-beta2 | |
OpenSSL | =0.9.7c | |
OpenSSL | =1.0.0-beta1 | |
OpenSSL | =0.9.5-beta1 | |
OpenSSL | =0.9.8n | |
OpenSSL | <=1.0.0b | |
OpenSSL | =1.0.0-beta2 | |
OpenSSL | =0.9.8p | |
OpenSSL | =0.9.6d | |
OpenSSL | =0.9.1c | |
OpenSSL | =0.9.6 | |
OpenSSL | =0.9.7j | |
OpenSSL | =0.9.6a | |
OpenSSL | =0.9.8e | |
OpenSSL | =0.9.4 | |
OpenSSL | =0.9.8g | |
OpenSSL | =0.9.6a-beta2 | |
OpenSSL | =0.9.8k | |
OpenSSL | =0.9.8d | |
OpenSSL | =0.9.5a | |
OpenSSL | =1.0.0-beta3 | |
OpenSSL | =0.9.6f | |
OpenSSL | =0.9.8j | |
OpenSSL | =0.9.6-beta3 | |
OpenSSL | =0.9.6l | |
OpenSSL | =0.9.7k | |
OpenSSL | =0.9.7g | |
OpenSSL | =0.9.6e | |
OpenSSL | =0.9.7d | |
OpenSSL | =0.9.8l | |
OpenSSL | =0.9.7 | |
OpenSSL | =0.9.6b | |
OpenSSL | =0.9.7e | |
OpenSSL | =0.9.7b | |
OpenSSL | =0.9.6a-beta1 | |
OpenSSL | =1.0.0-beta4 | |
OpenSSL | =0.9.6k | |
OpenSSL | =0.9.8a | |
OpenSSL | =0.9.6g | |
OpenSSL | =0.9.6-beta2 | |
OpenSSL | =0.9.7m | |
OpenSSL | =0.9.7-beta4 | |
OpenSSL | =0.9.3a | |
OpenSSL | =0.9.6h | |
OpenSSL | =1.0.0 | |
OpenSSL | =0.9.7-beta1 | |
OpenSSL | =0.9.7i | |
OpenSSL | =0.9.7h | |
OpenSSL | =0.9.8o | |
OpenSSL | =1.0.0-beta5 | |
OpenSSL | =0.9.6j | |
OpenSSL | =0.9.8 | |
OpenSSL | =0.9.7a | |
OpenSSL | =0.9.6c | |
OpenSSL | =0.9.6-beta1 | |
OpenSSL | =0.9.6m | |
OpenSSL | =0.9.8i | |
OpenSSL | =0.9.8f | |
OpenSSL | =0.9.5-beta2 | |
OpenSSL | =1.0.0a | |
OpenSSL | =0.9.8h | |
OpenSSL | =0.9.2b | |
OpenSSL | =0.9.5 | |
OpenSSL | =0.9.5a-beta1 | |
OpenSSL | =0.9.6a-beta3 | |
OpenSSL | =0.9.7f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4252 is considered a high severity vulnerability due to the potential for remote authentication bypass.
CVE-2010-4252 affects OpenSSL versions prior to 1.0.0c, specifically those with J-PAKE enabled.
To mitigate CVE-2010-4252, upgrade your OpenSSL version to 1.0.0c or later.
CVE-2010-4252 can be exploited through a crafted values attack in the J-PAKE protocol, allowing unauthorized authentication.
If you cannot update OpenSSL, consider disabling J-PAKE to reduce the risk of exploitation from CVE-2010-4252.