[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SA:2009:057 -- SUSE openssl man-in-the-middle attack

ID: oval:org.secpod.oval:def:400082Date: (C)2012-01-31   (M)2024-02-19
Class: PATCHFamily: unix




The TLS/SSLv3 protocol as implemented in openssl prior to this update was not able to associate already sent data to a renegotiated connection. This allowed man-in-the-middle attackers to inject HTTP requests in a HTTPS session without being noticed. For example Apache"s mod_ssl was vulnerable to this kind of attack because it uses openssl. It is believed that this vulnerability is actively exploited in the wild to get access to HTTPS protected web-sites. Please note that renegotiation will be disabled for any application using openssl by this update and may cause problems in some cases. Additionally this attack is not limited to HTTP.

Platform:
openSUSE 11.1
openSUSE 11.0
openSUSE 11.2
Product:
openssl
Reference:
SUSE-SA:2009:057
CVE-2009-3555
CVE    1
CVE-2009-3555
CPE    3
cpe:/o:opensuse:opensuse:11.1
cpe:/o:opensuse:opensuse:11.0
cpe:/o:opensuse:opensuse:11.2

© SecPod Technologies