OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://cvs.openssl.org/chngview?cn=17489 | |
http://secunia.com/advisories/42493 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/522176 | vendor advisory |
http://ubuntu.com/usn/usn-1029-1 | vendor advisory |
http://marc.info/?l=bugtraq&m=132077688910227&w=2 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=659462 | |
http://www.securityfocus.com/bid/45254 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2010-0977.html | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2010-0978.html | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2011-0896.html | vendor advisory |