CVE-2010-4252 Information

Share on:

Description

OpenSSL before 1.0.0c when J-PAKE is enabled does not properly validate the public parameters in the J-PAKE protocol which allows remote attackers to bypass the need for knowledge of the shared secret and successfully authenticate by sending crafted values in each round of the protocol.

Reference

http://cvs.openssl.org/chngview?cn=20098 http://marc.info/?l=bugtraq&m=129916880600544&w=2 http://marc.info/?l=bugtraq&m=130497251507577&w=2 http://openssl.org/news/secadv_20101202.txt http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf http://secunia.com/advisories/42469 http://secunia.com/advisories/57353 http://securitytracker.com/id?1024823 http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668471 http://www.securityfocus.com/bid/45163 http://www.vupen.com/english/advisories/2010/3120 http://www.vupen.com/english/advisories/2010/3122 http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 https://bugzilla.redhat.com/show_bug.cgi?id=659297 https://github.com/seb-m/jpake https://oval.cisecurity.org/repository/search/definition/oval3Aorg.mitre.oval3Adef3A19039