~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2014-3511

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2014-08-07
2
 
Candidate: CVE-2014-3511
3
 
PublicDate: 2014-08-13
4
 
References: 
5
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511
6
 
 https://www.openssl.org/news/secadv_20140806.txt
7
 
 https://usn.ubuntu.com/usn/usn-2308-1
8
 
Description:
9
 
 The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before
10
 
 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by
11
 
 triggering ClientHello message fragmentation in communication between a
12
 
 client and server that both support later TLS versions, related to a
13
 
 "protocol downgrade" issue.
14
 
Ubuntu-Description: 
15
 
Notes: 
16
 
Bugs: 
17
 
Priority: medium
18
 
Discovered-by: David Benjamin and Adam Langley
19
 
Assigned-to: mdeslaur
20
 
 
21
 
Patches_openssl:
22
 
 upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=fc4f4cdb8bf9981904e652abf69b892a45bddacf (1.0.1)
23
 
 upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=fc4bd2f287582c5f51f9549727fd5a49e9fc3012 (0.9.8)
24
 
upstream_openssl: released (1.0.1i)
25
 
lucid_openssl: not-affected
26
 
precise_openssl: released (1.0.1-4ubuntu5.17)
27
 
trusty_openssl: released (1.0.1f-1ubuntu2.5)
28
 
devel_openssl: released (1.0.1f-1ubuntu7)
29
 
 
30
 
Patches_openssl098:
31
 
upstream_openssl098: not-affected
32
 
lucid_openssl098: DNE
33
 
precise_openssl098: not-affected
34
 
trusty_openssl098: not-affected
35
 
devel_openssl098: not-affected