First published: Wed Jun 20 2012(Updated: )
The Diffie-Hellman key-exchange implementation in dhm.c in PolarSSL before 0.14.2 does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-5095.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PolarSSL | =0.11.0 | |
PolarSSL | =0.13.1 | |
PolarSSL | =0.12.1 | |
PolarSSL | <=0.14.0 | |
PolarSSL | =0.11.1 | |
PolarSSL | =0.10.1 | |
PolarSSL | =0.12.0 | |
PolarSSL | =0.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1923 has a medium severity, as it allows for potential man-in-the-middle attacks.
To fix CVE-2011-1923, you should upgrade PolarSSL to version 0.14.2 or later.
CVE-2011-1923 can facilitate man-in-the-middle attacks by allowing attackers to intercept and manipulate the Diffie-Hellman key exchange.
CVE-2011-1923 affects PolarSSL versions from 0.10.0 up to 0.14.0, excluding 0.14.2 and later.
The main cause of CVE-2011-1923 is the improper validation of public parameters in the Diffie-Hellman key-exchange implementation.