OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T03:34:37.524Z
Reserved: 2010-11-04T00:00:00
Link: CVE-2010-4180

No data.

Status : Modified
Published: 2010-12-06T21:05:48.687
Modified: 2024-11-21T01:20:23.207
Link: CVE-2010-4180
