First published: Tue Feb 16 2021(Updated: )
OpenSSL could provide weaker than expected security, caused by incorrect SSLv2 rollback protection that allows for the inversion of the logic during a padding check. If the server is configured for SSLv2 support at compile time, configured for SSLv2 support at runtime or configured for SSLv2 ciphersuites, it will accept a connection if a version rollback attack has occurred and erroneously reject a connection if a normal SSLv2 connection attempt is made.
Credit: openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | >=1.0.2s<=1.0.2x | |
Oracle Business Intelligence | =5.5.0.0.0 | |
Oracle Business Intelligence | =5.9.0.0.0 | |
Oracle Business Intelligence | =12.2.1.3.0 | |
Oracle Business Intelligence | =12.2.1.4.0 | |
Oracle Enterprise Manager For Storage Management | =13.4.0.0 | |
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
Oracle GraalVM | =19.3.5 | |
Oracle GraalVM | =20.3.1.2 | |
Oracle GraalVM | =21.0.0.2 | |
Oracle Jd Edwards World Security | =a9.4 | |
Oracle ZFS Storage Appliance Kit | =8.8 | |
Siemens Sinec Ins | <1.0 | |
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 | |
redhat/openssl | <1.1.1 | 1.1.1 |
redhat/openssl | <1.0.2 | 1.0.2 |
IBM EWM | <=7.0.1 | |
IBM RTC | <=6.0.6.1 | |
IBM EWM | <=7.0 | |
IBM RTC | <=6.0.6 | |
IBM EWM | <=7.0.2 | |
IBM DOORS Next | <=7.0.2 | |
IBM DOORS Next | <=7.0 | |
IBM DOORS Next | <=7.0.1 | |
IBM RDNG | <=6.0.6.1 | |
IBM RDNG | <=6.0.6 | |
IBM Engineering Requirements Quality Assistant On-Premises | <=All | |
IBM RELM | <=6.0.6.1 | |
IBM ENI | <=7.0.1 | |
IBM RELM | <=6.0.6 | |
IBM ENI | <=7.0 | |
IBM RELM | <=6.0.2 | |
IBM ENI | <=7.0.2 | |
IBM RQM | <=6.0.6.1 | |
IBM ETM | <=7.0.1 | |
IBM RQM | <=6.0.6 | |
IBM ETM | <=7.0.0 | |
IBM ETM | <=7.0.2 | |
IBM CLM | <=6.0.6.1 | |
IBM CLM | <=6.0.6 | |
IBM ELM | <=7.0 | |
IBM CLM | <=6.0.2 | |
IBM ELM | <=7.0.1 | |
IBM ELM | <=7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenSSL vulnerability is CVE-2021-23839.
The severity of CVE-2021-23839 is medium.
Software versions 1.0.2 and 1.1.1 of OpenSSL are affected by CVE-2021-23839.
To fix the OpenSSL vulnerability with CVE-2021-23839, update to version 1.1.1 of OpenSSL.
Yes, you can find more information about CVE-2021-23839 at the following references: [Reference 1](https://www.openssl.org/news/secadv/20210216.txt), [Reference 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1930318), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1930317).