Executive Summary

Informations
Name CVE-2011-5095 First vendor Publication 2012-06-20
Vendor Cve Last vendor Modification 2012-06-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:N)
Cvss Base Score 4 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5095

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-310 Cryptographic Issues

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:24741
 
Oval ID: oval:org.mitre.oval:def:24741
Title: OpenSSL vulnerability in 0.9.8, makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic
Description: The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.
Family: windows Class: vulnerability
Reference(s): CVE-2011-5095
Version: 4
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Product(s): OpenSSL
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Nessus® Vulnerability Scanner

Date Description
2013-01-25 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_libopenssl-devel-120710.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
MISC http://www.cl.cam.ac.uk/~rja14/Papers/psandqs.pdf
http://www.nessus.org/plugins/index.php?view=single&id=53360
https://discussions.nessus.org/thread/3381

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2021-05-04 12:18:05
  • Multiple Updates
2021-04-22 01:21:23
  • Multiple Updates
2020-05-23 00:32:26
  • Multiple Updates
2014-02-17 11:06:42
  • Multiple Updates
2013-05-10 23:12:24
  • Multiple Updates