OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2010-12-06T21:00:00
Updated: 2024-08-07T03:34:37.850Z
Reserved: 2010-11-16T00:00:00
Link: CVE-2010-4252
Vulnrichment
No data.
NVD
Status : Modified
Published: 2010-12-06T21:05:49.200
Modified: 2024-11-21T01:20:32.790
Link: CVE-2010-4252
Redhat