[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-4252

Date: (C)2010-12-06   (M)2017-09-22
 
CVSS Score: 7.5Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.

Reference:
SECTRACK-1024823
SECUNIA-42469
BID-45163
ADV-2010-3120
ADV-2010-3122
IAVM:2012-A-0148
IAVM:2012-A-0153
SSA:2010-340-01
SSRT100339
SSRT100475
http://cvs.openssl.org/chngview?cn=20098
http://openssl.org/news/secadv_20101202.txt
http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
https://bugzilla.redhat.com/show_bug.cgi?id=659297
https://github.com/seb-m/jpake

CPE    76
cpe:/a:openssl:openssl:1.0.0b
cpe:/a:openssl:openssl:1.0.0a
cpe:/a:openssl:openssl:1.0.0
cpe:/a:openssl:openssl:1.0.0:beta2
...
CWE    1
CWE-287
OVAL    2
oval:org.secpod.oval:def:848
oval:org.secpod.oval:def:1092

© 2013 SecPod Technologies