SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Splunk Vendors:   Splunk Inc.
(Splunk Issues Fix for Splunk Enterprise) OpenSSL SSL/TLS Weak Key Man-in-the-Middle Attack Lets Remote Users Decrypt and Modify Data
SecurityTracker Alert ID:  1030574
SecurityTracker URL:  http://securitytracker.com/id/1030574
CVE Reference:   CVE-2014-0224   (Links to External Site)
Date:  Jul 15 2014
Impact:   Disclosure of user information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to versions 5.0.9, 6.0.5, and 6.1.2
Description:   A vulnerability was reported in OpenSSL. A remote user can conduct a man-in-the-middle attack to decrypt and modify data. Splunk Enterprise is affected.

A remote user with the ability to conduct a man-in-the-middle attack between an affected client and an affected server can use a specially crafted handshake to cause the system to use a weak key.

Server versions 1.0.1 and 1.0.2-beta1 are affected.

All client versions are affected.

The vendor was notified on May 1, 2014.

KIKUCHI Masashi (Lepidum Co. Ltd.) reported this vulnerability via JPCERT/CC.

Impact:   A remote user can conduct a man-in-the-middle attack to decrypt and modify data.
Solution:   Splunk has issued a fix for Splunk Enterprise (5.0.9, 6.0.5, and 6.1.2).

The Splunk advisory is available at:

http://www.splunk.com/view/SP-CAAAM2D

Vendor URL:  www.openssl.org/news/secadv_20140605.txt (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (FreeBSD), UNIX (HP/UX), UNIX (macOS/OS X), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Jun 5 2014 OpenSSL SSL/TLS Weak Key Man-in-the-Middle Attack Lets Remote Users Decrypt and Modify Data



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC