CVE-2015-0205
Publication date 8 January 2015
Last updated 24 July 2024
Ubuntu priority
The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
Status
Package | Ubuntu Release | Status |
---|---|---|
openssl | ||
14.04 LTS trusty |
Fixed 1.0.1f-1ubuntu2.8
|
|
openssl098 | ||
14.04 LTS trusty | Not in release | |
Notes
mdeslaur
precise isn't actually affected, as the code used to be wrong, resulting in a no-op, and having the same result as this security fix. See the following commit: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=c2770c0e0e0da5f447227553c248f9a94504ee4e
Patch details
Package | Patch details |
---|---|
openssl |
References
Related Ubuntu Security Notices (USN)
- USN-2459-1
- OpenSSL vulnerabilities
- 12 January 2015