Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2014-3511

Published: 7 August 2014

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.

Priority

Medium

Status

Package Release Status
openssl
Launchpad, Ubuntu, Debian
lucid Not vulnerable

precise
Released (1.0.1-4ubuntu5.17)
trusty
Released (1.0.1f-1ubuntu2.5)
upstream
Released (1.0.1i)
Patches:
upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=fc4f4cdb8bf9981904e652abf69b892a45bddacf
upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=fc4bd2f287582c5f51f9549727fd5a49e9fc3012
openssl098
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Not vulnerable

trusty Does not exist
(trusty was not-affected)
upstream Not vulnerable