First published: Wed Jun 20 2012(Updated: )
The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =0.9.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5095 is classified as a medium severity vulnerability.
To fix CVE-2011-5095, upgrade to a version of OpenSSL later than 0.9.8 that does not have this vulnerability.
CVE-2011-5095 allows man-in-the-middle attackers to obtain the shared secret key, compromising secure communications.
Yes, CVE-2011-5095 is related to CVE-2011-1923, which also concerns the Diffie-Hellman key-exchange implementation.
CVE-2011-5095 affects OpenSSL version 0.9.8, specifically when FIPS mode is enabled.