First published: Wed Jun 20 2012(Updated: )
The Diffie-Hellman key-exchange implementation in dhm.c in PolarSSL before 0.14.2 does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-5095.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Polarssl Polarssl | =0.11.0 | |
Polarssl Polarssl | =0.13.1 | |
Polarssl Polarssl | =0.12.1 | |
Polarssl Polarssl | <=0.14.0 | |
Polarssl Polarssl | =0.11.1 | |
Polarssl Polarssl | =0.10.1 | |
Polarssl Polarssl | =0.12.0 | |
Polarssl Polarssl | =0.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.