OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T03:34:37.850Z
Reserved: 2010-11-16T00:00:00
Link: CVE-2010-4252

No data.

Status : Modified
Published: 2010-12-06T21:05:49.200
Modified: 2024-11-21T01:20:32.790
Link: CVE-2010-4252
