MEDIUM · 4.3

CVE-2010-4180

OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows re...

Vulnerability Description

OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.

CVSS Score

4.3

MEDIUM

AV:N/AC:M/Au:N/C:N/I:P/A:N
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
OpensslOpenssl< 0.9.8q
FedoraprojectFedora13
DebianDebian Linux5.0
CanonicalUbuntu Linux6.06
OpensuseOpensuse11.1
SuseLinux Enterprise11.0
SuseLinux Enterprise Desktop10
SuseLinux Enterprise Server9
F5Nginx< 0.9.2

References

FAQ

What is CVE-2010-4180?

CVE-2010-4180 is a vulnerability with a CVSS score of 4.3 (MEDIUM). OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows re...

How severe is CVE-2010-4180?

CVE-2010-4180 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2010-4180?

Check the references section above for vendor advisories and patch information. Affected products include: Openssl Openssl, Fedoraproject Fedora, Debian Debian Linux, Canonical Ubuntu Linux, Opensuse Opensuse.