[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2021-1608 --- openssl

ID: oval:org.secpod.oval:def:1700549Date: (C)2021-02-22   (M)2023-12-20
Class: PATCHFamily: unix




OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred . The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1(this is off by default

Platform:
Amazon Linux 2
Product:
openssl
Reference:
ALAS2-2021-1608
CVE-2021-23839
CVE-2021-23840
CVE-2021-23841
CVE    3
CVE-2021-23839
CVE-2021-23840
CVE-2021-23841

© SecPod Technologies