CVE-2009-3555 OpenSSL need to be updated to close TLS MITM attack
Bug #484417 reported by
Benjamin
This bug affects 4 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
openssl (Ubuntu) |
Fix Released
|
Low
|
Unassigned | ||
Lucid |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: openssl
http://
http://
Changes between 0.9.8k and 0.9.8l [5 Nov 2009]
*) Disable renegotiation completely - this fixes a severe security
problem (CVE-2009-3555) at the cost of breaking all
renegotiation. Renegotiation can be re-enabled by setting
SSL3_
run-time. This is really not recommended unless you know what
you're doing.
[Ben Laurie]
CVE References
visibility: | private → public |
Changed in openssl (Ubuntu): | |
importance: | Undecided → Low |
To post a comment you must log in.
While OpenSSL does need to be updated, it requires a protocol change to fix properly. At this time, Ubuntu is waiting on the protocol changes discussed by the IETF to be formalized before patching OpenSSL. In the meantime, since there are known attacks against the HTTPS protocol, Apache was updated to disallow client initiated TLS renegotiations in http:// www.ubuntu. com/usn/ USN-860- 1.