4
CVSSv2

CVE-2011-5095

Published: 20/06/2012 Updated: 21/06/2012
CVSS v2 Base Score: 4 | Impact Score: 4.9 | Exploitability Score: 4.9
VMScore: 356
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N

Vulnerability Summary

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle malicious users to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 0.9.8

Vendor Advisories

Debian Bug report logs - #684527 openssl: CVE-2011-5095 - The remote SSL/TLS server accepts a weak Diffie-Hellman public value Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Arne Wichmann <aw@ ...