{"vuid":"VU#978508","idnumber":"978508","name":"OpenSSL is vulnerable to a man-in-the-middle attack","keywords":["openssl","mitm","man","middle","attack"],"overview":"OpenSSL is vulnerable to a man-in-the-middle attack.","clean_desc":"The OpenSSL security advisory states: SSL/TLS MITM vulnerability (CVE-2014-0224) An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. The attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution. OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za. OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m. OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for discovering and researching this issue. This issue was reported to OpenSSL on 1st May 2014 via JPCERT/CC. The fix was developed by Stephen Henson of the OpenSSL core team partly based on an original patch from KIKUCHI Masashi. Additional details may be found in the OpenSSL security advisory. This vulnerability is one of many that has been fixed in the latest release. Masashi Kikuchi has written a technical blog post about the vulnerability.","impact":"A remote attacker with a man-in-the-middle vantage point on the network may be able to decrypt or modify traffic between a client and server.","resolution":"Apply an Update OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za. OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m. OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h.","workarounds":"","sysaffected":"","thanks":"Thanks to KIKUCHI Masashi for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["https://www.openssl.org/news/secadv_20140605.txt","http://ccsinjection.lepidum.co.jp/","http://ccsinjection.lepidum.co.jp/blog/2014-06-05/CCS-Injection-en/index.html","https://plus.google.com/app/basic/stream/z12xhp3hbzbhhjgfm22ncvtbeua1dpaa004"],"cveids":["CVE-2014-0224"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-05-08T14:41:39Z","publicdate":"2014-06-05T00:00:00Z","datefirstpublished":"2014-06-05T14:39:25Z","dateupdated":"2015-10-27T02:18:50Z","revision":31,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"A","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"H","cvss_targetdistribution":"H","cvss_securityrequirementscr":"H","cvss_securityrequirementsir":"M","cvss_securityrequirementsar":"L","cvss_basescore":"6.4","cvss_basevector":"AV:A/AC:M/Au:N/C:C/I:P/A:N","cvss_temporalscore":"5","cvss_environmentalscore":"8.09361373895168","cvss_environmentalvector":"CDP:H/TD:H/CR:H/IR:M/AR:L","metric":0.0,"vulnote":null}