OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://cvs.openssl.org/chngview?cn=20098 - Patch | |
References | () http://marc.info/?l=bugtraq&m=129916880600544&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=130497251507577&w=2 - | |
References | () http://openssl.org/news/secadv_20101202.txt - | |
References | () http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf - Exploit | |
References | () http://secunia.com/advisories/42469 - Vendor Advisory | |
References | () http://secunia.com/advisories/57353 - | |
References | () http://securitytracker.com/id?1024823 - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668471 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 - | |
References | () http://www.securityfocus.com/bid/45163 - | |
References | () http://www.vupen.com/english/advisories/2010/3120 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/3122 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=659297 - Patch | |
References | () https://github.com/seb-m/jpake - Patch | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19039 - |
Information
Published : 2010-12-06 21:05
Updated : 2024-11-21 01:20
NVD link : CVE-2010-4252
Mitre link : CVE-2010-4252
CVE.ORG link : CVE-2010-4252
JSON object : View
Products Affected
openssl
- openssl
CWE
CWE-287
Improper Authentication