5.8

CVE-2009-3555

Exploit

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

Data is provided by the National Vulnerability Database (NVD)
ApacheHTTP Server Version <= 2.2.14
GnuGnutls Version <= 2.8.5
MozillaNss Version <= 3.12.4
OpenSSLOpenSSL Version <= 0.9.8k
OpenSSLOpenSSL Version1.0 Editionopenvms
CanonicalUbuntu Linux Version8.04 SwEditionlts
CanonicalUbuntu Linux Version8.10
CanonicalUbuntu Linux Version9.04
CanonicalUbuntu Linux Version9.10
CanonicalUbuntu Linux Version10.04 SwEditionlts
CanonicalUbuntu Linux Version10.10
DebianDebian Linux Version4.0
DebianDebian Linux Version5.0
DebianDebian Linux Version6.0
DebianDebian Linux Version7.0
DebianDebian Linux Version8.0
FedoraprojectFedora Version11
FedoraprojectFedora Version12
FedoraprojectFedora Version13
FedoraprojectFedora Version14
F5Nginx Version >= 0.1.0 <= 0.8.22
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 2.84% 0.857
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.8 8.6 4.9
AV:N/AC:M/Au:N/C:N/I:P/A:P
CWE-295 Improper Certificate Validation

The product does not validate, or incorrectly validates, a certificate.

http://clicky.me/tlsvuln
Third Party Advisory
Exploit
http://seclists.org/fulldisclosure/2009/Nov/139
Third Party Advisory
Mailing List
http://securitytracker.com/id?1023148
Third Party Advisory
VDB Entry
http://ubuntu.com/usn/usn-923-1
Third Party Advisory
http://www.kb.cert.org/vuls/id/120541
Third Party Advisory
US Government Resource
http://www.links.org/?p=780
Third Party Advisory
http://www.links.org/?p=786
Third Party Advisory
http://www.links.org/?p=789
Third Party Advisory
http://www.securityfocus.com/archive/1/522176
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/36935
Patch
Third Party Advisory
Exploit
VDB Entry
http://www.securitytracker.com/id?1023163
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023204
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023205
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023206
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023207
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023208
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023209
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023210
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023211
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023212
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023213
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023214
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023215
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023216
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023217
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023218
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023219
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023224
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023243
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023270
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023271
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023272
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023273
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023274
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023275
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023411
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023426
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023427
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023428
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1024789
Third Party Advisory
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA10-222A.html
Third Party Advisory
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA10-287A.html
Third Party Advisory
US Government Resource
https://bugzilla.mozilla.org/show_bug.cgi?id=526689
Third Party Advisory
Issue Tracking
https://bugzilla.mozilla.org/show_bug.cgi?id=545755
Third Party Advisory
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=533125
Third Party Advisory
Issue Tracking