CVE-2014-3511

Priority
Medium
Description
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before
1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by
triggering ClientHello message fragmentation in communication between a
client and server that both support later TLS versions, related to a
"protocol downgrade" issue.
References
Assigned-to
mdeslaur
Package
Upstream:not-affected
Ubuntu 10.04 LTS (Lucid Lynx):DNE
Ubuntu 12.04 LTS (Precise Pangolin):not-affected
Ubuntu 14.04 LTS (Trusty Tahr):not-affected
Ubuntu 14.10 (Utopic Unicorn):not-affected
Package
Upstream:released (1.0.1i)
Ubuntu 10.04 LTS (Lucid Lynx):not-affected
Ubuntu 12.04 LTS (Precise Pangolin):released (1.0.1-4ubuntu5.17)
Ubuntu 14.04 LTS (Trusty Tahr):released (1.0.1f-1ubuntu2.5)
Ubuntu 14.10 (Utopic Unicorn):released (1.0.1f-1ubuntu7)
Patches:
Upstream:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=fc4f4cdb8bf9981904e652abf69b892a45bddacf (1.0.1)
Upstream:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=fc4bd2f287582c5f51f9549727fd5a49e9fc3012 (0.9.8)
More Information

Valid XHTML 1.0 Strict

Updated: 2014-08-20 21:14:37 UTC (commit 8395)