First published: Thu Mar 25 2010(Updated: )
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)<br>and Transport Layer Security (TLS v1) protocols, as well as a<br>full-strength, general purpose cryptography library.<br>A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure<br>Sockets Layer) protocols handled session renegotiation. A man-in-the-middle<br>attacker could use this flaw to prefix arbitrary plain text to a client's<br>session (for example, an HTTPS connection to a website). This could force<br>the server to process an attacker's request as if authenticated using the<br>victim's credentials. This update addresses this flaw by implementing the<br>TLS Renegotiation Indication Extension, as defined in RFC 5746.<br>(CVE-2009-3555)<br>Refer to the following Knowledgebase article for additional details about<br>this flaw: <a href="http://kbase.redhat.com/faq/docs/DOC-20491" target="_blank">http://kbase.redhat.com/faq/docs/DOC-20491</a> All openssl097a users should upgrade to these updated packages, which<br>contain a backported patch to resolve this issue. For the update to take<br>effect, all services linked to the openssl097a library must be restarted,<br>or the system rebooted.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl097a | <0.9.7a-9.el5_4.2 | 0.9.7a-9.el5_4.2 |
redhat/openssl097a | <0.9.7a-9.el5_4.2 | 0.9.7a-9.el5_4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0164 is classified as moderate.
To fix RHSA-2010:0164, you need to update OpenSSL to version 0.9.7a-9.el5_4.2 or later.
RHSA-2010:0164 affects OpenSSL version 0.9.7a-9.el5_4.2, particularly the openssl097a package.
RHSA-2010:0164 addresses a flaw related to the implementation of TLS and SSL protocols.
RHSA-2010:0164 was released on March 31, 2010.