First published: Mon Jun 02 2014(Updated: )
It was found that OpenSSL was vulnerable to a SSL/TLS MITM vulnerability. An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. As per the upstream advisory: The attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution. OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za. OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m. OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h. Acknowledgements: Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter of this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <0.9.8 | 0.9.8 |
OpenSSL OpenSSL | <0.9.8za | |
OpenSSL OpenSSL | >=1.0.0<1.0.0m | |
OpenSSL OpenSSL | >=1.0.1<1.0.1h | |
Redhat Jboss Enterprise Application Platform | =5.2.0 | |
Redhat Jboss Enterprise Application Platform | =6.2.3 | |
Redhat Jboss Enterprise Web Platform | =5.2.0 | |
Redhat Jboss Enterprise Web Server | =2.0.1 | |
Redhat Storage | =2.1 | |
Fedoraproject Fedora | =19 | |
Fedoraproject Fedora | =20 | |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 | |
Redhat Enterprise Linux | =4 | |
Redhat Enterprise Linux | =5 | |
Redhat Enterprise Linux | =6.0 | |
Filezilla-project Filezilla Server | <0.9.45 | |
Siemens Application Processing Engine Firmware | <2.0.2 | |
Siemens Application Processing Engine | ||
Siemens Cp1543-1 Firmware | <1.1.25 | |
Siemens Cp1543-1 | ||
Siemens S7-1500 Firmware | <1.6 | |
Siemens S7-1500 | ||
Siemens Rox Firmware | <1.16.1 | |
Siemens Rox | ||
Mariadb Mariadb | >=10.0.0<10.0.13 | |
Python Python | >=2.7.0<2.7.8 | |
Python Python | >=3.4.0<3.4.2 | |
Nodejs Node.js | <0.10.29 |
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.