[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created

ID: 593Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: DRAFT
Abstraction Type: Variant





Description

The software modifies the SSL context after connection creation has begun.

Extended Description

If the program modifies the SSL_CTX object after creating SSL objects from it, there is the possibility that older SSL objects created from the original context could all be affected by that change.

Applicable Platforms
None

Time Of Introduction

  • Architecture and Design
  • Implementation

Related Attack Patterns

Common Consequences

ScopeTechnical ImpactNotes
Access_Control
 
Bypass protection mechanism
 
No authentication takes place in this process, bypassing an assumed protection of encryption.
 
Confidentiality
 
Read application data
 
The encrypted communication between a user and a trusted host may be subject to a "man in the middle" sniffing attack.
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Architecture and Design
 
 Use a language which provides a cryptography framework at a higher level of abstraction.
 
  
Implementation
 
 Most SSL_CTX functions have SSL counterparts that act on SSL-type objects.
 
  
Implementation
 
 Applications should set up an SSL_CTX completely, before creating SSL objects from it.
 
  

Relationships

Related CWETypeViewChain
CWE-593 ChildOf CWE-898 Category CWE-888  

Demonstrative Examples
None

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings
None

References:
None

© SecPod Technologies