OpenSSL prior to 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote malicious users to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openssl openssl 0.9.7 |
||
openssl openssl 0.9.5a |
||
openssl openssl 0.9.8b |
||
openssl openssl 0.9.7l |
||
openssl openssl 0.9.6i |
||
openssl openssl 0.9.8m |
||
openssl openssl 0.9.3 |
||
openssl openssl 0.9.8c |
||
openssl openssl 0.9.7c |
||
openssl openssl 1.0.0 |
||
openssl openssl 0.9.5 |
||
openssl openssl 0.9.8n |
||
openssl openssl |
||
openssl openssl 0.9.8p |
||
openssl openssl 0.9.6d |
||
openssl openssl 0.9.1c |
||
openssl openssl 0.9.6 |
||
openssl openssl 0.9.7j |
||
openssl openssl 0.9.6a |
||
openssl openssl 0.9.8e |
||
openssl openssl 0.9.4 |
||
openssl openssl 0.9.8g |
||
openssl openssl 0.9.8k |
||
openssl openssl 0.9.8d |
||
openssl openssl 0.9.6f |
||
openssl openssl 0.9.8j |
||
openssl openssl 0.9.6l |
||
openssl openssl 0.9.7k |
||
openssl openssl 0.9.7g |
||
openssl openssl 0.9.6e |
||
openssl openssl 0.9.7d |
||
openssl openssl 0.9.8l |
||
openssl openssl 0.9.6b |
||
openssl openssl 0.9.7e |
||
openssl openssl 0.9.7b |
||
openssl openssl 0.9.6k |
||
openssl openssl 0.9.8a |
||
openssl openssl 0.9.6g |
||
openssl openssl 0.9.7m |
||
openssl openssl 0.9.3a |
||
openssl openssl 0.9.6h |
||
openssl openssl 0.9.7i |
||
openssl openssl 0.9.7h |
||
openssl openssl 0.9.8o |
||
openssl openssl 0.9.6j |
||
openssl openssl 0.9.8 |
||
openssl openssl 0.9.7a |
||
openssl openssl 0.9.6c |
||
openssl openssl 0.9.6m |
||
openssl openssl 0.9.8i |
||
openssl openssl 0.9.8f |
||
openssl openssl 1.0.0a |
||
openssl openssl 0.9.8h |
||
openssl openssl 0.9.2b |
||
openssl openssl 0.9.7f |