VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-4252
openssl: OpenSSL before 1.0.0c, when J-PAKE is enabled, does...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4252

Original

OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-12-06
Source Information Category:
Advisory, Alert
Last Updated:
2010-12-07




Affected Product Tags
cpe:/a:openssl:openssl:0.9.1c
cpe:/a:openssl:openssl:0.9.2b
cpe:/a:openssl:openssl:0.9.3
cpe:/a:openssl:openssl:0.9.3a
cpe:/a:openssl:openssl:0.9.4
cpe:/a:openssl:openssl:0.9.5
cpe:/a:openssl:openssl:0.9.5:beta1
cpe:/a:openssl:openssl:0.9.5:beta2
cpe:/a:openssl:openssl:0.9.5a
cpe:/a:openssl:openssl:0.9.5a:beta1
cpe:/a:openssl:openssl:0.9.5a:beta2
cpe:/a:openssl:openssl:0.9.6
cpe:/a:openssl:openssl:0.9.6:beta1
cpe:/a:openssl:openssl:0.9.6:beta2
cpe:/a:openssl:openssl:0.9.6:beta3
cpe:/a:openssl:openssl:0.9.6a
cpe:/a:openssl:openssl:0.9.6a:beta1
cpe:/a:openssl:openssl:0.9.6a:beta2
cpe:/a:openssl:openssl:0.9.6a:beta3
cpe:/a:openssl:openssl:0.9.6b
cpe:/a:openssl:openssl:0.9.6c
cpe:/a:openssl:openssl:0.9.6d
cpe:/a:openssl:openssl:0.9.6e
cpe:/a:openssl:openssl:0.9.6f
cpe:/a:openssl:openssl:0.9.6g
cpe:/a:openssl:openssl:0.9.6h
cpe:/a:openssl:openssl:0.9.6i
cpe:/a:openssl:openssl:0.9.6j
cpe:/a:openssl:openssl:0.9.6k
cpe:/a:openssl:openssl:0.9.6l
cpe:/a:openssl:openssl:0.9.6m
cpe:/a:openssl:openssl:0.9.7
cpe:/a:openssl:openssl:0.9.7:beta1
cpe:/a:openssl:openssl:0.9.7:beta2
cpe:/a:openssl:openssl:0.9.7:beta3
cpe:/a:openssl:openssl:0.9.7:beta4
cpe:/a:openssl:openssl:0.9.7:beta5
cpe:/a:openssl:openssl:0.9.7:beta6
cpe:/a:openssl:openssl:0.9.7a
cpe:/a:openssl:openssl:0.9.7b
cpe:/a:openssl:openssl:0.9.7c
cpe:/a:openssl:openssl:0.9.7d
cpe:/a:openssl:openssl:0.9.7e
cpe:/a:openssl:openssl:0.9.7f
cpe:/a:openssl:openssl:0.9.7g
cpe:/a:openssl:openssl:0.9.7h
cpe:/a:openssl:openssl:0.9.7i
cpe:/a:openssl:openssl:0.9.7j
cpe:/a:openssl:openssl:0.9.7k
cpe:/a:openssl:openssl:0.9.7l
cpe:/a:openssl:openssl:0.9.7m
cpe:/a:openssl:openssl:0.9.8
cpe:/a:openssl:openssl:0.9.8a
cpe:/a:openssl:openssl:0.9.8b
cpe:/a:openssl:openssl:0.9.8c
cpe:/a:openssl:openssl:0.9.8d
cpe:/a:openssl:openssl:0.9.8e
cpe:/a:openssl:openssl:0.9.8f
cpe:/a:openssl:openssl:0.9.8g
cpe:/a:openssl:openssl:0.9.8h
cpe:/a:openssl:openssl:0.9.8i
cpe:/a:openssl:openssl:0.9.8j
cpe:/a:openssl:openssl:0.9.8k
cpe:/a:openssl:openssl:0.9.8l
cpe:/a:openssl:openssl:0.9.8m
cpe:/a:openssl:openssl:0.9.8n
cpe:/a:openssl:openssl:0.9.8o
cpe:/a:openssl:openssl:0.9.8p
cpe:/a:openssl:openssl:1.0.0
cpe:/a:openssl:openssl:1.0.0:beta1
cpe:/a:openssl:openssl:1.0.0:beta2
cpe:/a:openssl:openssl:1.0.0:beta3
cpe:/a:openssl:openssl:1.0.0:beta4
cpe:/a:openssl:openssl:1.0.0:beta5
cpe:/a:openssl:openssl:1.0.0a
cpe:/a:openssl:openssl:1.0.0b and previous versions
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
Medium [?]
X Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

Alternatives




References
BID 45163




CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=659297




CONFIRM http://cvs.openssl.org/chngview?cn=20098




CONFIRM http://openssl.org/news/secadv_20101202.txt




MISC https://github.com/seb-m/jpake




MISC http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf




SECTRACK 1024823




Vulnerability Type Authentication Issues (CWE-287)





Copyright © 2010 JPCERT/CC All Rights Reserved.