Executive Summary

Informations
Name CVE-2010-4252 First vendor Publication 2010-12-06
Vendor Cve Last vendor Modification 2023-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4252

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-287 Improper Authentication

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:19039
 
Oval ID: oval:org.mitre.oval:def:19039
Title: OpenSSL vulnerability before 1.0.0c in VisualSVN Server (CVE-2010-4252)
Description: OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
Family: windows Class: vulnerability
Reference(s): CVE-2010-4252
Version: 5
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): VisualSVN Server
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19202
 
Oval ID: oval:org.mitre.oval:def:19202
Title: HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass
Description: OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
Family: unix Class: vulnerability
Reference(s): CVE-2010-4252
Version: 12
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20561
 
Oval ID: oval:org.mitre.oval:def:20561
Title: VMware vSphere and vCOps updates to third party libraries
Description: OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
Family: unix Class: vulnerability
Reference(s): CVE-2010-4252
Version: 4
Platform(s): VMWare ESX Server 4.1
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24993
 
Oval ID: oval:org.mitre.oval:def:24993
Title: Vulnerability in OpenSSL before 1.0.0c, does not properly validate the public parameters in the J-PAKE protocol
Description: OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
Family: windows Class: vulnerability
Reference(s): CVE-2010-4252
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): OpenSSL
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 300

OpenVAS Exploits

Date Description
2012-08-31 Name : VMSA-2012-0013 VMware vSphere and vCOps updates to third party libraries.
File : nvt/gb_VMSA-2012-0013.nasl
2012-02-12 Name : Gentoo Security Advisory GLSA 201110-01 (openssl)
File : nvt/glsa_201110_01.nasl
2011-05-05 Name : HP-UX Update for OpenSSL HPSBUX02638
File : nvt/gb_hp_ux_HPSBUX02638.nasl
0000-00-00 Name : Slackware Advisory SSA:2010-340-01 openssl
File : nvt/esoft_slk_ssa_2010_340_01.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
69657 OpenSSL J-PAKE Public Parameter Validation Shared Secret Authentication Bypass

OpenSSL contains a flaw related to public parameter validation of the J-PAKE protocol. The issue is triggered when a remote attacker uses crafted values for each round of the protocol to avoid the requirement for the shared sacred and bypass authentication.

Information Assurance Vulnerability Management (IAVM)

Date Description
2012-09-27 IAVM : 2012-A-0153 - Multiple Vulnerabilities in VMware ESX 4.0 and ESXi 4.0
Severity : Category I - VMSKEY : V0033884
2012-09-13 IAVM : 2012-B-0086 - VMware vCenter Operations Arbitrary File Overwrite Vulnerability
Severity : Category I - VMSKEY : V0033791
2012-09-13 IAVM : 2012-A-0146 - Multiple Vulnerabilities in VMware vCenter Update Manager 4.1
Severity : Category I - VMSKEY : V0033792
2012-09-13 IAVM : 2012-A-0147 - Multiple Vulnerabilities in VMware vCenter Server 4.1
Severity : Category I - VMSKEY : V0033793
2012-09-13 IAVM : 2012-A-0148 - Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1
Severity : Category I - VMSKEY : V0033794

Nessus® Vulnerability Scanner

Date Description
2016-02-29 Name : The remote VMware ESX / ESXi host is missing a security-related patch.
File : vmware_VMSA-2012-0013_remote.nasl - Type : ACT_GATHER_INFO
2015-10-12 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL17382.nasl - Type : ACT_GATHER_INFO
2013-11-13 Name : The remote VMware ESXi 5.0 host is affected by multiple vulnerabilities.
File : vmware_esxi_5_0_build_912577_remote.nasl - Type : ACT_GATHER_INFO
2013-07-29 Name : The remote host has a virtualization appliance installed that is affected by ...
File : vcenter_operations_manager_vmsa_2012-0013.nasl - Type : ACT_GATHER_INFO
2013-06-17 Name : The remote host has an update manager installed that is affected by multiple ...
File : vmware_vcenter_update_mgr_vmsa-2012-0013.nasl - Type : ACT_GATHER_INFO
2013-06-05 Name : The remote host has a virtualization management application installed that is...
File : vmware_vcenter_vmsa-2012-0013.nasl - Type : ACT_GATHER_INFO
2012-08-31 Name : The remote VMware ESXi / ESX host is missing one or more security-related pat...
File : vmware_VMSA-2012-0013.nasl - Type : ACT_GATHER_INFO
2012-01-04 Name : The remote SSL layer is affected by a denial of service vulnerability.
File : openssl_0_9_8p_1_0_0e.nasl - Type : ACT_GATHER_INFO
2011-10-10 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201110-01.nasl - Type : ACT_GATHER_INFO
2010-12-08 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2010-340-01.nasl - Type : ACT_GATHER_INFO
2010-12-07 Name : The remote web server is affected by multiple vulnerabilities.
File : openssl_1_0_0c.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/45163
CONFIRM http://cvs.openssl.org/chngview?cn=20098
http://openssl.org/news/secadv_20101202.txt
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
https://bugzilla.redhat.com/show_bug.cgi?id=659297
HP http://marc.info/?l=bugtraq&m=129916880600544&w=2
http://marc.info/?l=bugtraq&m=130497251507577&w=2
MISC http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf
https://github.com/seb-m/jpake
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECTRACK http://securitytracker.com/id?1024823
SECUNIA http://secunia.com/advisories/42469
http://secunia.com/advisories/57353
SLACKWARE http://slackware.com/security/viewer.php?l=slackware-security&y=2010&...
VUPEN http://www.vupen.com/english/advisories/2010/3120
http://www.vupen.com/english/advisories/2010/3122

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
Date Informations
2024-02-02 01:14:31
  • Multiple Updates
2024-02-01 12:04:03
  • Multiple Updates
2023-09-05 12:13:32
  • Multiple Updates
2023-09-05 01:03:55
  • Multiple Updates
2023-09-02 12:13:37
  • Multiple Updates
2023-09-02 01:03:58
  • Multiple Updates
2023-08-12 12:16:13
  • Multiple Updates
2023-08-12 01:03:57
  • Multiple Updates
2023-08-11 12:13:40
  • Multiple Updates
2023-08-11 01:04:06
  • Multiple Updates
2023-08-06 12:13:08
  • Multiple Updates
2023-08-06 01:03:59
  • Multiple Updates
2023-08-04 12:13:13
  • Multiple Updates
2023-08-04 01:03:59
  • Multiple Updates
2023-07-14 12:13:10
  • Multiple Updates
2023-07-14 01:03:57
  • Multiple Updates
2023-03-29 01:15:06
  • Multiple Updates
2023-03-28 12:04:04
  • Multiple Updates
2023-02-13 09:29:04
  • Multiple Updates
2023-02-02 21:28:50
  • Multiple Updates
2022-10-11 12:11:45
  • Multiple Updates
2022-10-11 01:03:44
  • Multiple Updates
2022-02-03 12:09:05
  • Multiple Updates
2021-05-04 12:12:45
  • Multiple Updates
2021-04-22 01:13:27
  • Multiple Updates
2020-05-23 01:43:03
  • Multiple Updates
2020-05-23 00:26:55
  • Multiple Updates
2019-09-24 01:03:21
  • Multiple Updates
2019-03-19 12:03:49
  • Multiple Updates
2018-08-10 12:02:02
  • Multiple Updates
2017-09-19 09:24:04
  • Multiple Updates
2016-08-23 09:24:39
  • Multiple Updates
2016-06-28 18:22:39
  • Multiple Updates
2016-04-26 20:14:19
  • Multiple Updates
2016-03-01 13:26:32
  • Multiple Updates
2015-10-13 13:24:41
  • Multiple Updates
2014-03-26 13:21:53
  • Multiple Updates
2014-02-17 10:58:37
  • Multiple Updates
2013-11-11 12:39:05
  • Multiple Updates
2013-11-04 21:21:07
  • Multiple Updates
2013-05-10 23:36:54
  • Multiple Updates