CVE-2010-4180

OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
VendorProductVersion
opensslopenssl
𝑥
< 0.9.8q
opensslopenssl
1.0.0 ≤
𝑥
< 1.0.0c
debiandebian_linux
5.0
canonicalubuntu_linux
6.06
canonicalubuntu_linux
8.04
canonicalubuntu_linux
9.04
canonicalubuntu_linux
10.04
canonicalubuntu_linux
10.10
opensuseopensuse
11.1
opensuseopensuse
11.2
opensuseopensuse
11.3
opensuseopensuse
11.4
suselinux_enterprise
11.0:sp1
f5nginx
𝑥
< 0.9.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssl
maverick
Fixed 0.9.8o-1ubuntu4.3
released
lucid
Fixed 0.9.8k-7ubuntu8.5
released
karmic
Fixed 0.9.8g-16ubuntu3.5
released
hardy
Fixed 0.9.8g-4ubuntu3.13
released
dapper
Fixed 0.9.8a-7ubuntu0.14
released
References