[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97147

 
 

909

 
 

78764

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2014-3511

Date: (C)2014-08-12   (M)2017-11-18 


The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.

CVSS Score: 4.3Access Vector: NETWORK
Exploit Score: 8.6Access Complexity: MEDIUM
Impact Score: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: NONE





Reference:
SECTRACK-1030693
SECUNIA-58962
SECUNIA-59700
SECUNIA-59710
SECUNIA-59756
SECUNIA-59887
SECUNIA-60022
SECUNIA-60221
SECUNIA-60377
SECUNIA-60493
SECUNIA-60684
SECUNIA-60803
SECUNIA-60810
SECUNIA-60890
SECUNIA-60917
SECUNIA-60921
SECUNIA-60938
SECUNIA-61017
SECUNIA-61043
SECUNIA-61100
SECUNIA-61139
SECUNIA-61184
SECUNIA-61775
SECUNIA-61959
BID-69079
DSA-2998
FEDORA-2014-9301
FEDORA-2014-9308
FreeBSD-SA-14:18
GLSA-201412-39
HPSBMU03261
HPSBMU03263
HPSBMU03267
HPSBMU03304
NetBSD-SA2014-008
RHSA-2015:0126
RHSA-2015:0197
SSRT101818
SSRT101846
SSRT101894
https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
http://linux.oracle.com/errata/ELSA-2014-1052.html
http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240
http://www-01.ibm.com/support/docview.wss?uid=swg21682293
http://www-01.ibm.com/support/docview.wss?uid=swg21683389
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
http://www.arubanetworks.com/support/alerts/aid-08182014.txt
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
http://www.splunk.com/view/SP-CAAANHS
http://www.tenable.com/security/tns-2014-06
https://bugzilla.redhat.com/show_bug.cgi?id=1127504
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=280b1f1ad12131defcd986676a8fc9717aaa601b
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://kc.mcafee.com/corporate/index?page=content&id=SB10084
https://techzone.ergon.ch/CVE-2014-3511
https://www.openssl.org/news/secadv_20140806.txt
openSUSE-SU-2014:1052
openssl-cve20143511-sec-bypass(95162)

CPE    31
cpe:/a:openssl:openssl:1.0.0m
cpe:/a:openssl:openssl:1.0.1h
cpe:/a:openssl:openssl:1.0.1
cpe:/a:openssl:openssl:1.0.1a
...
OVAL    19
oval:org.secpod.oval:def:20879
oval:org.secpod.oval:def:501363
oval:org.secpod.oval:def:203400
oval:org.secpod.oval:def:1500684
...

© 2013 SecPod Technologies