CVE-2014-3511

Severity

43%

Complexity

86%

Confidentiality

48%

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N).

Overview

Type

OpenSSL Project OpenSSL

First reported 10 years ago

2014-08-13 23:55:00

Last updated 7 years ago

2017-11-15 02:29:00

Affected Software

OpenSSL Project OpenSSL 1.0.0

1.0.0

OpenSSL Project OpenSSL 1.0.0 Beta1

1.0.0

OpenSSL Project OpenSSL 1.0.0 Beta2

1.0.0

OpenSSL Project OpenSSL 1.0.0 Beta3

1.0.0

OpenSSL Project OpenSSL 1.0.0 Beta4

1.0.0

OpenSSL Project OpenSSL 1.0.0 Beta5

1.0.0

OpenSSL Project OpenSSL 1.0.0a

1.0.0a

OpenSSL Project OpenSSL 1.0.0b

1.0.0b

OpenSSL Project OpenSSL 1.0.0c

1.0.0c

OpenSSL Project OpenSSL 1.0.0d

1.0.0d

OpenSSL Project OpenSSL 1.0.0e

1.0.0e

OpenSSL Project OpenSSL 1.0.0f

1.0.0f

OpenSSL Project OpenSSL 1.0.0g

1.0.0g

OpenSSL Project OpenSSL 1.0.0h

1.0.0h

OpenSSL Project OpenSSL 1.0.0i

1.0.0i

OpenSSL Project OpenSSL 1.0.0j

1.0.0j

OpenSSL Project OpenSSL 1.0.0k

1.0.0k

OpenSSL Project OpenSSL 1.0.0l

1.0.0l

OpenSSL Project OpenSSL 1.0.0m

1.0.0m

OpenSSL Project OpenSSL 1.0.1

1.0.1

OpenSSL Project OpenSSL 1.0.1 Beta1

1.0.1

OpenSSL Project OpenSSL 1.0.1 Beta2

1.0.1

OpenSSL Project OpenSSL 1.0.1 Beta3

1.0.1

OpenSSL Project OpenSSL 1.0.1a

1.0.1a

OpenSSL Project OpenSSL 1.0.1b

1.0.1b

OpenSSL Project OpenSSL 1.0.1c

1.0.1c

OpenSSL Project OpenSSL 1.0.1d

1.0.1d

OpenSSL Project OpenSSL 1.0.1e

1.0.1e

OpenSSL Project OpenSSL 1.0.1f

1.0.1f

OpenSSL Project OpenSSL 1.0.1g

1.0.1g

OpenSSL Project OpenSSL 1.0.1h

1.0.1h

References

NetBSD-SA2014-008

http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc

http://linux.oracle.com/errata/ELSA-2014-1052.html

FEDORA-2014-9301

FEDORA-2014-9308

openSUSE-SU-2014:1052

SSRT101818

HPSBMU03260

HPSBMU03267

SSRT101846

HPSBMU03304

HPSBMU03263

HPSBMU03261

RHSA-2015:0126

RHSA-2015:0197

58962

59700

59710

59756

59887

60022

60221

60377

60493

60684

60803

60810

60890

60917

60921

60938

61017

61043

61100

61139

61184

61775

61959

GLSA-201412-39

http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15564.html

http://www.arubanetworks.com/support/alerts/aid-08182014.txt

DSA-2998

http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm

69079

1030693

http://www.splunk.com/view/SP-CAAANHS

http://www.tenable.com/security/tns-2014-06

http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240

http://www-01.ibm.com/support/docview.wss?uid=swg21682293

http://www-01.ibm.com/support/docview.wss?uid=swg21683389

http://www-01.ibm.com/support/docview.wss?uid=swg21686997

https://bugzilla.redhat.com/show_bug.cgi?id=1127504

openssl-cve20143511-sec-bypass(95162)

https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=280b1f1ad12131defcd986676a8fc9717aaa601b

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380

https://kc.mcafee.com/corporate/index?page=content&id=SB10084

[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released

https://support.citrix.com/article/CTX216642

https://techzone.ergon.ch/CVE-2014-3511

FreeBSD-SA-14:18

https://www.openssl.org/news/secadv_20140806.txt

Vendor Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.