CVE-2010-4252

OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
References
Link Resource
http://cvs.openssl.org/chngview?cn=20098 Patch
http://marc.info/?l=bugtraq&m=129916880600544&w=2
http://marc.info/?l=bugtraq&m=129916880600544&w=2
http://marc.info/?l=bugtraq&m=130497251507577&w=2
http://marc.info/?l=bugtraq&m=130497251507577&w=2
http://openssl.org/news/secadv_20101202.txt
http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf Exploit
http://secunia.com/advisories/42469 Vendor Advisory
http://secunia.com/advisories/57353
http://securitytracker.com/id?1024823
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668471
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
http://www.securityfocus.com/bid/45163
http://www.vupen.com/english/advisories/2010/3120 Vendor Advisory
http://www.vupen.com/english/advisories/2010/3122 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=659297 Patch
https://github.com/seb-m/jpake Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19039
http://cvs.openssl.org/chngview?cn=20098 Patch
http://marc.info/?l=bugtraq&m=129916880600544&w=2
http://marc.info/?l=bugtraq&m=129916880600544&w=2
http://marc.info/?l=bugtraq&m=130497251507577&w=2
http://marc.info/?l=bugtraq&m=130497251507577&w=2
http://openssl.org/news/secadv_20101202.txt
http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf Exploit
http://secunia.com/advisories/42469 Vendor Advisory
http://secunia.com/advisories/57353
http://securitytracker.com/id?1024823
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668471
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
http://www.securityfocus.com/bid/45163
http://www.vupen.com/english/advisories/2010/3120 Vendor Advisory
http://www.vupen.com/english/advisories/2010/3122 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=659297 Patch
https://github.com/seb-m/jpake Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19039
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*

History

21 Nov 2024, 01:20

Type Values Removed Values Added
References () http://cvs.openssl.org/chngview?cn=20098 - Patch () http://cvs.openssl.org/chngview?cn=20098 - Patch
References () http://marc.info/?l=bugtraq&m=129916880600544&w=2 - () http://marc.info/?l=bugtraq&m=129916880600544&w=2 -
References () http://marc.info/?l=bugtraq&m=130497251507577&w=2 - () http://marc.info/?l=bugtraq&m=130497251507577&w=2 -
References () http://openssl.org/news/secadv_20101202.txt - () http://openssl.org/news/secadv_20101202.txt -
References () http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf - Exploit () http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf - Exploit
References () http://secunia.com/advisories/42469 - Vendor Advisory () http://secunia.com/advisories/42469 - Vendor Advisory
References () http://secunia.com/advisories/57353 - () http://secunia.com/advisories/57353 -
References () http://securitytracker.com/id?1024823 - () http://securitytracker.com/id?1024823 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668471 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668471 -
References () http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 - () http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 -
References () http://www.securityfocus.com/bid/45163 - () http://www.securityfocus.com/bid/45163 -
References () http://www.vupen.com/english/advisories/2010/3120 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/3120 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/3122 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/3122 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=659297 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=659297 - Patch
References () https://github.com/seb-m/jpake - Patch () https://github.com/seb-m/jpake - Patch
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19039 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19039 -

Information

Published : 2010-12-06 21:05

Updated : 2024-11-21 01:20


NVD link : CVE-2010-4252

Mitre link : CVE-2010-4252

CVE.ORG link : CVE-2010-4252


JSON object : View

Products Affected

openssl

  • openssl
CWE
CWE-287

Improper Authentication