CVE-2011-1923
20.06.2012, 17:55
The Diffie-Hellman key-exchange implementation in dhm.c in PolarSSL before 0.14.2 does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-5095.Enginsight
Vendor | Product | Version |
---|---|---|
polarssl | polarssl | 𝑥 ≤ 0.14.0 |
polarssl | polarssl | 0.10.0 |
polarssl | polarssl | 0.10.1 |
polarssl | polarssl | 0.11.0 |
polarssl | polarssl | 0.11.1 |
polarssl | polarssl | 0.12.0 |
polarssl | polarssl | 0.12.1 |
polarssl | polarssl | 0.13.1 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References