Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - OpenSSL: changing ciphersuite

December 2010 by Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/

SYNTHESIS OF THE VULNERABILITY

When a server uses OpenSSL, a remote attacker can change the
ciphersuite, in order to force the usage of a weaker algorithm.

Severity: 2/4

Creation date: 03/12/2010

DESCRIPTION OF THE VULNERABILITY

The SSL session caching feature saves sessions, to be reused
later. An application can enable it with the
SSL_CTX_set_session_cache_mode() function. For example, Apache
httpd does not enable it.

The SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG flag allows a
ciphersuite change, to resolve a compatibility problem with old
Netscape web browsers.

However, when a server uses session caching and
SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG (or SSL_OP_ALL), a
malicious client can use this feature to choose a weaker algorithm
for the following sessions.

When a server uses OpenSSL, a remote attacker can therefore change
the ciphersuite, in order to force the usage of a weaker algorithm.

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/OpenSSL-changing-ciphersuite-10173


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts