Man-in-the-Middle (MitM) Affecting openssl package, versions >=1.0.1, <1.0.109
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-COCOAPODS-OPENSSL-471181
- published 2 Oct 2019
- disclosed 14 May 2014
- credit Unknown
Introduced: 14 May 2014
CVE-2014-3511 Open this link in a new tabHow to fix?
Upgrade OpenSSL
to version 1.0.109 or higher.
Overview
OpenSSL is a SSL/TLS and Crypto toolkit. Deprecated in Mac OS and gone in iOS, this spec gives your project non-deprecated OpenSSL support.
Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). OpenSSL is vulnerable to man in the middle (MitM) attacks. These attacks are possible through the ssl23_get_client_hello function in s23_srvr.c. It can be triggered by a ClientHello message fragment which forces OpenSSL to negotiate using the TLS 1.0 protocol insteadl of a higher, more secure version.
References
- Debian Security Advisory
- Fedora Security Announcement
- Fedora Security Announcement
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc
- Gentoo Security Advisory
- HPE Support Center Security Bulletin
- HPE Support Center Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- HP Security Bulletin
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc
- http://linux.oracle.com/errata/ELSA-2014-1052.html
- https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=280b1f1ad12131defcd986676a8fc9717aaa601b
- https://kc.mcafee.com/corporate/index?page=content&id=SB10084
- https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html
- https://support.citrix.com/article/CTX216642
- https://techzone.ergon.ch/CVE-2014-3511
- http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html
- https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
- https://www.openssl.org/news/secadv_20140806.txt
- http://www.arubanetworks.com/support/alerts/aid-08182014.txt
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm
- http://www.splunk.com/view/SP-CAAANHS
- http://www.tenable.com/security/tns-2014-06
- IBM Security Bulletin
- IBM Security Bulletin
- IBM Security Bulletin
- IBM Security Bulletin
- OpenSuse Security Update
- RedHat Bugzilla Bug
- RedHat Security Advisory
- RedHat Security Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Secunia Advisory
- Security Focus
- Security Tracker
- X-force Vulnerability Report