CVE-2011-5095

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*

History

21 Nov 2024, 01:33

Type Values Removed Values Added
References () http://www.cl.cam.ac.uk/~rja14/Papers/psandqs.pdf - () http://www.cl.cam.ac.uk/~rja14/Papers/psandqs.pdf -
References () http://www.nessus.org/plugins/index.php?view=single&id=53360 - () http://www.nessus.org/plugins/index.php?view=single&id=53360 -
References () https://discussions.nessus.org/thread/3381 - () https://discussions.nessus.org/thread/3381 -

Information

Published : 2012-06-20 17:55

Updated : 2024-11-21 01:33


NVD link : CVE-2011-5095

Mitre link : CVE-2011-5095

CVE.ORG link : CVE-2011-5095


JSON object : View

Products Affected

openssl

  • openssl
CWE
CWE-310

Cryptographic Issues