OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Information
Published : 2010-12-06 13:05
Updated : 2022-08-04 12:59
NVD link : CVE-2010-4180
Mitre link : CVE-2010-4180
JSON object : View
CWE
Products Affected
f5
- nginx
suse
- linux_enterprise_desktop
- linux_enterprise
- linux_enterprise_server
openssl
- openssl
fedoraproject
- fedora
canonical
- ubuntu_linux
debian
- debian_linux
opensuse
- opensuse